ITIL V3 - HP Service Manager
ITIL V3 - HP Service Manager
ITIL V3 - HP Service Manager
for supported Windows and Unix operating systems Software Version: 7.1x
Legal Notices
Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted Rights Legend Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notices Copyright 19942009, Hewlett-Packard Development Company, L.P. This product includes cryptographic software written by Eric Young ([email protected]). This product includes software written by Tim Hudson ([email protected]). Smack software copyright Jive Software, 1998-2004. SVG Viewer, Mozilla JavaScript-C (SpiderMonkey), and Rhino software Copyright 1998-2004 The Mozilla Organization. This product includes software developed by the OpenSSL Project for use in the OpenSSL toolkit. (http://www.openssl.org). OpenSSL software copyright 1998-2005 The OpenSSL Project. All rights reserved. This project includes software developed by the MX4J project (http://mx4j.sourceforge.net). MX4J software copyright 2001-2004 MX4J Team. All rights reserved. JFreeChart software 2000-2004, Object Refinery Limited. All rights reserved. JDOM software copyright 2000 Brett McLaughlin, Jason Hunter. All rights reserved. LDAP, OpenLDAP, and the Netscape Directory SDK Copyright 1995-2004 Sun Microsystems, Inc. Japanese Morphological Analyzer 2004 Basis Technology Corp. The Sentry Spelling-Checker Engine Copyright 2000 Wintertree Software Inc. Spell Checker copyright 1995-2004 Wintertree Software Inc. CoolMenu software copyright 2001 Thomas Brattli. All rights reserved. Coroutine Software for Java owned by Neva Object Technology, Inc. and is protected by US and international copyright law. Crystal Reports Pro and Crystal RTE software 2001 Crystal Decisions, Inc., All rights reserved. Eclipse software Copyright 2000, 2004 IBM Corporation and others. All rights reserved. Copyright 2001-2004 Kiran Kaja and Robert A. van Engelen, Genivia Inc. All rights reserved. Xtree copyright 2004 Emil A. Eklund. This product includes software developed by the Indiana University Extreme! Lab (<http://www.extreme.indiana.edu/>). Portions copyright Daniel G. Hyans, 1998. cbg.editor Eclipse plugin copyright 2002, Chris Grindstaff. Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are copyright 2001-2004 Robert A. van Engelen, Genivia Inc. All Rights Reserved. Copyright 1991-2005 Unicode, Inc. All rights reserved. Distributed under the Terms of Use in http://www.unicode.org/copyright.html. Trademark Notices Java and all Java based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Oracle is a registered US trademark of Oracle Corporation, Redwood City, California. Unix is a registered trademark of The Open Group.
Documentation Updates
The title page of this document contains the following identifying information: Software Version number, which indicates the software version. Document Release Date, which changes each time the document is updated. Software Release Date, which indicates the release date of this version of the software.
To check for recent updates or to verify that you are using the most recent edition of a document, go to: http://h20230.www2.hp.com/selfsolve/manuals This site requires that you register for an HP Passport and sign in. To register for an HP Passport ID, go to: http://h20229.www2.hp.com/passport-registration.html Or click the New users - please register link on the HP Passport login page. You will also receive updated or new editions if you subscribe to the appropriate product support service. Contact your HP sales representative for details.
Support
Visit the HP Software Support Online web site at: www.hp.com/go/hpsoftwaresupport This web site provides contact information and details about the products, services, and support that HP Software offers. HP Software online support provides customer self-solve capabilities. It provides a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the support web site to: Search for knowledge documents of interest Submit and track support cases and enhancement requests Download software patches Manage support contracts Look up HP support contacts Review information about available services Enter into discussions with other software customers Research and register for software training
Most of the support areas require that you register as an HP Passport user and sign in. Many also require a support contract. To register for an HP Passport ID, go to: http://h20229.www2.hp.com/passport-registration.html To find more information about access levels, go to: http://h20230.www2.hp.com/new_access_levels.jsp
Content
Input and output for Problem Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101 Key performance indicators for Problem Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102 ITIL V3 Key Performance Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102 COBIT 4.1 Key Performance Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102 RACI matrix for Problem Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .251
10
11
Architecture
Service Manager has a three-tiered client/server architecture: The presentation layer displays information to the user through a client (either a web client or Windows client). Service Manager displays information to the user on forms. The application layer consists of the various applications and the Run-Time Environment (RTE). The application server executes the workflow code. The database layer is an external relational database management system (RDBMS) to which Service Manager has been mapped. The database stores the application workflow code and the format descriptions.
An administrator sets parameters in the Service Manager initialization (sm.ini) file to select language, display color scheme of the forms, connection parameters to the relational database management system (RDBMS) and so on.
12
Chapter 1
Windows client
The Windows client runs on Microsoft Windows platforms but can connect to a server running on any supported platform.
Web client
The web client runs from a web browser and connects to the web tier (a system where a supported web application server and web server are installed). The web tier in turn connects to the Service Manager server, which can run on any supported platform.
By making optimal use of the functionality that Service Manager offers, you can implement state-of-the-art service management processes.
13
ITIL V3
ITIL processes provide a framework with which you can identify, record, and control all of the objects that make up an information technology (IT) infrastructure. It has become the most widely accepted approach to ITSM in the world. A key concept of ITIL is that of services. A service is a means of delivering value to customers by facilitating outcomes customers want to achieve without the ownership of specific costs and risks. ITIL V3 is a lifecyle-based approach with five stages aimed at delivering a set of services to achieve defined business outcomes. ITIL consists of a series of books giving guidance on the provision of quality IT services, and on the accommodation and environmental facilities needed to support IT. ITIL has been developed in recognition of organizations' growing dependency on IT and embodies best practices for IT Service Management. For complete information on ITIL, see their web site at www.itil-officialsite.com. The HP Service Manager processes are based on ITIL V3 theory and are referenced in the ITIL V3 core. The ITIL core consists of the following five documents, each of which describes a different aspect of providing Service Management: Service Strategy focuses on how to design, develop, and implement Service Management both as a service and as a strategic asset. It gives guidance on how to improve the alignment between your Service Management capabilities and your business strategies. Important topics include Service Portfolio Management and Financial Management. Service Design focuses on how to design, develop, improve, and maintain value over the lifecycle of services and Service Management processes. It gives guidance on how to convert strategic objectives into services and service assets. Important topics include Availability Management, Capacity Management, Continuity Management, and Security Management. Service Transition focuses on how to transition new or updated services into operation. It gives guidance on how to control the risks of failure and disruption and prevent undesired consequences while still allowing innovation. Important topics include Change Management, Release Management, Configuration Management, and Service Knowledge Management. Service Operation focuses on the activities required to manage service operation and to achieve effectiveness in the delivery and support of services as defined in Service Level Agreements with the customers. Important topics include Incident Management, Problem Management, and Request Fulfillment. Continual Service Improvement focuses on how to create and maintain value by continual improvement to the quality of the services that an IT organization delivers to a business or customer. Important topics include Service Reporting, Service Measurement, and Service Level Management.
Service Manager best practices implement the following processes found in the ITIL Service Transition and Service Operation documents. These processes are described in the chapters that follow. Table 1-1 ITIL processes referred to in this document ITIL Chapter Name Incident Management Problem Management Change Management Configuration Management SM Process ID SO 2 SO 4 ST 2 ST 3
ITIL V3 Core Volume Service Operations Service Operations Service Transition Service Transition
14
Chapter 1
ISO 20000
ISO/IEC 20000 consists of two parts under the general title, Information Technology Service Management: Code of practice ISO 20000-1. The subject of Part 1 promotes the adoption of an integrated process approach to effectively deliver managed services to meet the business and customer requirements. It comprises ten sections:
1 2 3 4 5 6 7 8 9
Scope Terms and Definitions Requirements for a Management System Planning and Implementing Service Management Planning and Implementing New or Changed Services Service Delivery Process Relationship Processes Control Processes Resolution Processes
10 Release Process
ISO 20000-2 is a Code of Practice and describes the recommendations for service management within the scope of ISO 20000-1. It comprises the same sections as Part 1 except that it excludes the Requirements for a Management System as no requirements are imposed by Part 2. Service Managers best practices coverage of the ISO 20000-2 code of practice items is shown in Service Managers compliance with ISO 20000 on page 235.
COBIT 4.1
COBIT (the Control Objectives for Information and related Technology) was developed by the IT Governance Institute (www.ITGI.org) to advance international thinking and standards in directing and controlling enterprise information technology. COBIT supports IT Governance through its framework of 34 IT processes. This framework ensures business and IT alignment, maximizes IT enablement of business processes, optimizes IT resources, and manages risk. COBIT groups its 34 processes into four domains: Plan and Organize Acquire and Implement Deliver and Support Monitor and Evaluate
Each process has a high-level control objective (the desired outcome) and one or more detailed control objectives that address the requirements of the actual activities that it performs. COBIT ensures: IT and business alignment IT enabled business processes IT resource optimization IT management of risks
15
COBITs framework accomplishes these goals by focusing onthe business requirement for information, and the structured (process) utilization of IT resources. COBITs framework establishes what needs to be done to provide the information the enterprise needs to achieve its goals. IT control objectives provide a complete set of high-level requirements to be considered by management for effective control of each IT process. These requirements: Provide statements of managerial actions to increase value or reduce risk Consist of policies, procedures, practices and organizational structures Provide reasonable assurance that business objectives will be achieved and undesired events will be prevented or detected and corrected
Service Managers best practices coverage of COBIT is shown in Service Managers compliance with COBIT 4.1 on page 239.
16
Chapter 1
Figure 1-1
Example of an IT Organization
17
Incident Management and Problem Management are separate processes although they are closely linked. Incident Management expressly covers the restoration of services to users, whereas Problem Management covers identifying and removing the causes of incidents. Change Management The Change Management application controls the process to request, manage, approve, and control changes that modify your organization's IT infrastructure. This process includes changes to all assets and configuration items, such as network environments, facilities, telephony, and resources. It covers changes to baseline service assets and configuration items across the entire service life cycle. For more information on this application and the associated processes, go to Chapter 13, Change Management Details. Configuration Management The Configuration Management application ensures that selected components of a complete IT service, system, or product (the Configuration Item) are identified, baselined, and maintained and that changes to them are controlled. It also ensures that releases into controlled environments and operational use are completed on the basis of formal approvals. For more information on this application and the associated processes, go to Chapter 14, Configuration Management Overview.
18
Chapter 1
Figure 1-2
19
Service Desk
Many incidents start as issues communicated by end users to the service desk. When a Service Desk Agent cannot resolve and close an issue on first contact, he or she escalates it to an incident. If the Service Desk Agent finds an existing incident that affected the same CI or one of the related CI's, the incident is associated with the interaction record. If an existing incident ticket is not found, a new incident ticket is opened, based on the Service Desk interaction. When the incident is resolved and closed, the Service Desk communicates the closure to the end user and closes the interaction that initiated the incident. If the reason for a call is a disruption in service and the Service Desk Agent cannot resolve the issue, it is escalated to Incident Management until service is restored.
Incident Management
Incident Management provides effective incident classification and tracking to provide good data for analysis. The Knowledge Base that Service Manager builds and maintains is a solution repository for new incidents. Matching incidents to problems and known errors is the first step in spotting trends. Subsequently, trend analysis helps you remove errors before they affect a large segment of users. As part of the Incident Investigation and Diagnosis process, an Incident Analyst can open new emergency changes required for immediate resolution of the incident. This is only the case if there is no effective or useful workaround available. In the Emergency Change Handling process, the Change Analyst informs the Incident Manager about successfully implemented emergency changes and, if the Incident Manager agrees, closes the related incident ticket. Incident Management contributes to improved service levels.When an incident is opened, the default Base Monitoring Service Level Agreement (SLA) for IT services is triggered. This SLA specifies response objectives (the maximum time allowed before an incident should reach the resolved state), but does not define availability objectives. Both problems and incidents affect service delivery.
Problem Management
Incident Management forms part of the overall process of dealing with problems in the organization. Incidents are often caused by underlying problems that must be solved to prevent the incident from recurring. Service Manager allows you to enable certain Incident Management users to indicate problem candidates. The incident ticket includes a field that indicates whether the issue that caused the incident is most likely a problem and should have a problem ticket created for it. In addition, as part of the Incident Investigation and Diagnosis process, the operator needs to consider whether the incident is related to an open problem or known error. If it is, they must relate the incident ticket to the problem ticket or known error record. The incident then remains open until a workaround for the problem becomes available. If related to a known error, there will always be a workaround. Problem Management maintains information about problems and the appropriate workarounds and resolutions, which helps an organization reduce the number and impact of incidents over time. Problem Management has a strong interface with Knowledge Management, and tools such as the Known Error Database are used for both. This gives operators the ability to search the knowledgebase for useful
20
Chapter 1
information and to contribute to it, benefiting those who are investigating, diagnosing, and resolving incidents and interactions. Incident Management operators can search the knowledgebase, and can create a knowledge article based on the incident at hand.
Change Management
Service Desk open-idle interactions with a category of Request for Change can be escalated to Change Management. These change requests are reviewed by a Change Coordinator who either assigns the change to the applicable support group to make it part of the Change Review process, or rejects the change request. Changes rejected for insufficient information are returned to the Service Desk Agent for additional information gathering. Others are rejected because the change is no longer valid. When operators determine that an incident was caused by a change, they search the Changes database to see if a recent change may have caused the service disruption. If such a change exists, they can link the two records. If no such change exists, but a new change should be registered, they can open a new change. The operator can also look at any changes that have recently been performed against the reported Configuration Item. Problem Management submits resolutions and workarounds that require a change to Change Management. Change Management tracks and implements the Request for Change (RFC), which permanently changes the infrastructure and prevents future incidents. When the RFC is complete, the Problem Management process reviews the change before the known error record can close. An integration to HP Universal CMDB adds and updates configuration item (CI) records that can trigger an unplanned change or change verification action in Change Management. If the integration detects updates to a CI that do not match an existing change request, Service Manager creates a new change request with the unplanned change category. A Change Coordinator can then review the change and approve or deny it. If the integration finds a matching change request, it can verify the CI attributes against the expected values and automatically close the change if they match.
Configuration Management
Configuration Management is used throughout the system to help identify and track configuration items (CIs) as necessary. Accurate tracking of incidents and changes starts with control of resources and their relationships. For example, when operators escalate an interaction or open an incident directly, they may specify the affected configuration item. When a configuration item is identified, the Incident Management process investigates and attempts to resolve the issue with the item. The final resolution may require a problem ticket to be created to fix the source of the problem, and generate change request in Change Management. Scheduled maintenance uses configuration management to enables the automatic creation of Incident tickets and Change requests for regular proactive maintenance. The Incident Analyst can also view the Configuration Item tree to discover if related Configuration Items could have caused the incident.
21
22
Chapter 1
The HP Service Manager Service Desk application, referred to as Service Desk throughout this chapter, supports the service desk function of the Information Technology Infrastructure Library (ITIL) with its User Interaction Management processes for the IT service and the customer base. The Service Desk application provides a single point of entry to the other Service Manager applications and enables you to document and track all calls received by the service desk. Service Desk incorporates the essential concepts of ITIL to ensure that the best practices of IT service management are applied to the service desk to aid end customers, ensure data integrity, and streamline communication channels in the organization. This section describes how Service Desk implements the best practice guidelines for the User Interaction Management processes. Topics in this section include: The service desk within the ITIL framework on page 24 The Service Desk application on page 24 User Interaction Management process overview on page 25 Input and output for User Interaction Management on page 28 Key performance indicators for User Interaction Management on page 29 RACI matrix for User Interaction Management on page 30
23
24
Chapter 2
The Service Desk application enables a Service Desk agent to document and track user interactions. Service Desk provides one-click access to other Service Manager applications to automatically enter information received. The Service Desk application covers: Direct interactions between a user and the service desk by phone or by email User activities that occur from use of the self-service Web portal (for example, searching the knowledgebase, checking for status updates, or logging an interaction).
One of the best practices that derives from ITILs service desk function is that user interactions should not be saved and updated later. Therefore, the Service Desk application requires that any new interaction either be resolved within the agreed upon time limits and then closed or, if it cannot be resolved, escalated. The information gathered during the customer interaction can be used to open an incident ticket if a reported issue requires further action. It can also be added to a record in another Service Manager application, such as Change Management.
25
Figure 2-1
26
Chapter 2
When a user contacts the service desk, the Service Desk agent uses the Service Desk application to create an interaction record. The Service Desk agent records the user name, the name of the component that the user is calling about, and a description of the service request. After collecting this information, the Service Desk agent performs the actions required to resolve the user request. If the service request is resolved without escalating it to an incident, the Service Desk agent can close the interaction record. If the service request cannot be resolved without escalating it to an incident, the Service Desk agent searches for existing incidents that affect the same component or one of the parent assets of that component. If an existing incident is found, the Service Desk agent can associat the current interaction with the e existing incident ticket. If an existing incident ticket is not found, the Service Desk agent can register a new incident based on the Service Desk interaction. Service Desk copies information from the interaction record into the newly-created incident ticket. For example, consider a user who cannot print to a network printer:
1 2 3 4 5 6 7
The user contacts the service desk for assistance. The Service Desk agent populates an interaction record with the relevant information. Because the issue cannot be resolved immediately, the Service Desk agent opens an incident, and the incident is assigned to a technician. The technician discovers that the printer network connection is broken. The technician fixes the connection and closes the incident. The Service Desk agent contacts the user and instructs the user to attempt printing to the network printer. If the user can successfully print, the Service Desk agent can close the interaction. If the user still cannot print, the Service Desk agent may reopen the existing related incident ticket or create a new incident and then relate the unsolved interaction. If the user wishes to report a related or new issue, the Service Desk agent closes the interaction (as the original issue was resolved) and opens a new interaction detailing the new issue the user needs to report.
27
A user can contact the service desk Service desk personnel can handle an interaction in the following and give input by using instant ways: messages, phone, email, self-service If the interaction is related to a new or existing incident, the web pages, or other means. interaction is handled by using the Incident Management process. If the interaction involves a request, the interaction is sent to the request fulfillment process. If the interaction requires a change, the interaction is sent to the Change Management process.
28
Chapter 2
For completeness, the ITIL V3 and COBIT 4.1 KPIs are included below.
29
User R R R/I
30
Chapter 2
Every time a user contacts the service desk it is logged as an interaction. User interaction management is the process of handling all interactions with the service desk that are received from self-service Web pages or directly by service desk personnel. These interactions can include service disruptions, service requests, requests for information (RFI), and complaints reported by users who communicate with the service desk by using instant messages, phone, email, or self-service Web pages. The Service Desk agent follows the necessary steps and searches for related knowledge records, known error records, and existing incidents or changes. The process enables Service Desk agents to easily log and resolve simple user requests and to escalate others into incidents requiring further action. The process streamlines service desk activities and decreases the workload for second-line support teams. The User Interaction Management process consists of the following processes, which are included in this chapter: Self-Service by User (process SO 0.1) on page 31 Interaction Handling (process SO 0.2) on page 34 Interaction Closure (process SO 0.3) on page 37
You can see the details of this process in the following figure and table.
31
32
Figure 3-1
Table 3-1 Process ID SO 0.1.1 SO 0.1.2 SO 0.1.3 SO 0.1.4 SO 0.1.5 SO 0.1.6 SO 0.1.7
Procedure or Decision Log in to Self-Service Register new interaction? Order item from service catalog? Submit query to knowledgebase Satisfied with answer found? Open a new interaction Manually complete interaction details Submit interaction Validate solution of solved interaction? Validate solution Interaction solved? Resubmit interaction and provide update
Description To gain access to the Self-Service Web interface, users must log on by using their login credentials. If yes, continue with SO 0.1.3. If no, go to SO 0.1.9. If yes, go to the request fulfillment process. If no, submit a query to the KnowledgeBase. To search for a knowledge document, users must complete a search. If yes, stop. If no, go to SO 0.1.6. To open a new interaction from the knowledge search screen, users must click the New Interaction button. To register a new interaction, users must provide a description of the request; select the urgency, affected Service, and preferred contact method; and can optionally add an attachment. When all mandatory fields are completed, click Submit to send the request to the service desk. To validate the solution to a previously reported interaction, go to SO 0.1.10. If no, go to SO 0.1.13. Use View Open Requests to get an overview of all solved interactions. Select the applicable interaction and validate the solution provided. If yes, stop. If no, go to SO 0.1.12. When a user disagrees with the proposed solution, the user can resubmit the interaction and provide a reason for the disagreement. The newly-created interaction is automatically linked to the old interaction and sent to the service desk for further diagnosis. If a user wants to check the status or history of previously registered interactions, go to SO 0.1.14. If no, stop.
SO 0.1.13
User
33
Description Use View Open Requests to get an overview of all open or closed interactions. Select the interaction and view the status with last updates. If a user has additional details to add to the previously-logged interaction that may be useful to know for the specialist, go to SO 0.1.16. If no, stop. There are two scenarios to update an interaction and have a Save button to save the updated information. The Save button appears when a self-service user selects the option View Open Requests, selects an interaction, and clicks the Update button. Once the information is updated, the self-service user clicks Save to save the updated information in the request. When you escalate an interaction, you can go back to the interaction to add more information or perform changes to it. You then have a Save button when you select an existing interaction. The interaction is also a status of Open - Linked or Open - Callback. Once you have added more information to the request or performed the changes, you can click Save.
34
Chapter 3
Figure 3-2
35
Interaction Handling (SO 0.2) process Procedure or Decision Link user details to new interaction Determine affected service Concerns previously registered interaction? Apply interaction model (when appropriate) Follow model instructions Manually fill out interaction details
Description Fill in the name of the caller in the Contact Person field and the name of the user in the Service Recipient field (if different). In the Affected Service field, select the service that matches the user request. If the user contacts the service desk for a previously registered interaction, go to SO 0.2.13. If not, go to SO 0.2.4. If there is an interaction model available, apply the model to quickly define the interaction. If no model exists, the default interaction settings are shown. The predefined fields are filled in from the model. When there is a script attached to the model, follow the questions and fill in the answers. Fill out the required interaction details such as short title, a full description, interaction type, and categorization. In addition, select the applicable impact and urgency. The assignment group is automatically filled in, based on the service and categorization selected. If the interaction concerns a Service Request, go to the Request Fulfilment process. If not, go to SO 0.2.8. If the interaction concerns a Request for Change, go to the Change process. If not, go to SO 0.2.9. Based on the service and categorization, the Service Desk agent performs a search to find any open incidents that match the user interaction. If yes, go to SO 0.2.18. If not, go to SO 0.2.10.
Role Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent
SO 0.2.5
SO 0.2.6
Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent
SO 0.2.10
Match to open problem Based on the service and categorization, the Service Desk agent or known error? performs a search to find any open problems or known errors that match the user interaction. If yes, go to SO 0.2.20. If no, go to SO 0.2.11. Solution found in knowledgebase? Service Desk Agent able to solve? Provide update to user and update existing interaction Reopen incident? Reopening allowed? Based on the description and categorization, the Service Desk agent performs a knowledgebase search. If yes, go to SO 0.2.21. If no, go to SO 0.2.12. If the Service Desk Agent is sufficiently equipped with tools and knowledge to solve the interaction for the user, go to SO 0.2.22. If not, go to the Create Incident process. Inform the user of recent updates made by Analysts, and then update the interaction by stating that the user requested an update. If the user is unhappy with a solution provided and the incident must be reopened, go to SO 0.2.15. If not, go to SO 0.2.16. If reopening the incident is allowed due to a user request during the period of two weeks after solution notification, go to SO 0.2.17. If not, go to SO 0.2.6.
SO 0.2.11
Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent
SO 0.2.12
SO 0.2.13
SO 0.2.14 SO 0.2.15
36
Chapter 3
Interaction Handling (SO 0.2) process (contd) Procedure or Decision Cancel newly created interaction Reopen incident
Description Cancel the newly created interaction, as this registration is not needed anymore. Reopen the previously registered incident that was solved incorrectly by changing the status to Open and providing an update that states the reason that the incident was reopened. Relate the interaction to the open incident. Save the interaction in the interaction database and provide the interaction number to the user. There is one scenario where you have a Save button to save an interaction record. When you escalate an interaction, you can go back to the interaction to add more information or perform changes to it. You then have a Save button when you select an existing interaction. The interaction is also a status of Open - Linked or Open - Callback. Once you have added more information to the request or performed the changes, you can click Save.
Role Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent
SO 0.2.18 SO 0.2.19
Relate interaction to problem/known error Relate interaction to knowledge record Document solution in interaction Implement solution
Relate the interaction to the problem or known error. Relate the interaction to the knowledge record to populate the solution in the interaction record. Describe the solution in the Solution field. Perform the actions needed to implement the solution and go to the Interaction Closure process.
Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent
37
38
Figure 3-3
Interaction Closure (SO 0.3) process Procedure or Decision Check solution completeness Service Desk Agent accepts solution? Reopen incident Call back user? Generate email notification to user
Description The Service Desk agent checks the solution provided for all Open-Callback interactions. If yes, go to SO 0.3.4. If no, go to SO 0.3.3. The Service Desk agent reopens the incident ticket for further investigation and diagnosis. If the Notify By method states that the user wants to be notified by phone, go to SO 0.3.6. If not, go to SO 0.3.5. The user receives an automatic email about the interaction closure containing the interaction details, including the solution. The user can check the solution by using the self-service Web portal, and can reject the solution within two weeks. After two weeks, the interaction is automatically closed. The Service Desk Agent contacts the user and communicates the resolution. The user should verify the solution and confirm that the incident is solved and that the question or complaint is answered, or the Service Request is fulfilled. If yes, go the SO 0.3.9. If no, go to SO 0.3.8. The solution provided may not solve the issue for all users. If the solution does not solve the issue for all users, the Service Desk Agent must either reopen the existing incident or create a new incident, and then relate the unsolved interaction(s). The Service Desk Agent closes the interaction.
Role Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent
SO 0.3.6
SO 0.3.7 SO 0.3.8
SO 0.3.9
Close interaction
39
40
Chapter 3
HP Service Manager uses its Service Desk application to enable the User Interaction Management process. The main function of User Interaction Management is to monitor, track, and record calls and open incidents, as necessary. In User Interaction Management, a Service Desk Agent receives a call and opens a new interaction. The Service Desk Agent fills in the required fields, and then chooses to close the interaction or escalate it to an incident. This section describes selected User Interaction Management fields in the out-of-box Service Manager system. Topics in this section include: New interaction form on page 42 Interaction form after escalation on page 43 User Interaction Management form details on page 44 Interaction categories on page 50
41
Figure 4-1
42
Chapter 4
Figure 4-2
43
This is a required field. Service Recipient This interaction is for The person who has the problem and needs it resolved. It is not necessarily the person who is calling to report the problem. Filling in this field automatically fills in the contact name from the contact record of who should be notified of the resolution. The Service Desk Agent populates this field with the person this issue is registered for. When the primary contact is also the service recipient, Service Manager fills this field in after the service is selected. After filling in the service recipient, the Service Desk Agent can use the Smart Indicator positioned at the end of the field to view open or closed interactions for this contact. This is a required field.
44
Chapter 4
User Interaction Management form details Description The Service Desk Agent populates this field with the business service affected by the registered issue. Only business services the service recipient has a subscription for can be selected. As a best practice, users should select the affected service before selecting the Affected CI because the Affected CI selection is limited by the service selected by a user. Selecting the service first prevents a mismatch between the service and the CI. ITIL V3 is centered around services, so a service construct should always be defined for best practices. If you have not yet created a service construct, start with a catch-all service, such as My Devices. Note: The out-of-box options in this field are based on past Service Manager implementations. You should tailor these options to match your business needs. These business services are available out-of-box: Applications E-mail/Webmail Handheld PDA & Telephony Intranet Internet My Devices (The My Devices service represents all personal devices that the user would use.) Printing May limit the list of affected CIs. Validates that it is a valid service
An end user is more likely to know that the e-mail service does not work than what part of the e-mail service does not work. This is a required field. Tip: You can use the Smart Indicator, positioned at the end of the field, to search for related incidents or problems. Affected Items Affected CI The Service Desk Agent populates this field with the configuration item (CI). Click Fill to select from a list of the physical CIs that relate to the service. Other CIs can be entered manually. If the business service does not contain any CIs, then the list shows only the CIs that the service recipient is subscribed to and the CIs that are assigned to the service recipient. If you choose an application, you are presented with a list of CIs in the service, as well as those that you own. After filling in the affected CI, the Service Desk Agent can use the Smart Indicator positioned at the end of the field to search for open and closed incidents for this CI, and to view the details. Title The Service Desk Agent populates this field with a brief description that identifies the interaction. Note: Service Manager searches this field when you do an advance or expert text search. This is a required field.
45
User Interaction Management form details Description The Service Desk Agent populates this field with a detailed description of the interaction. When the location and telephone number differ from the contact details, the Service Desk Agent can record the correct information in the description field. Clicking Search Knowledge searches description fields across multiple Service Manager knowledgebases for the text entered. Depending on the permissions of the user, Service Manager may look in interactions, incidents, problems, known errors, and knowledge documents. The Service Desk Agent can use the solution from any returned document as the solution for the interaction. Note: Service Manager searches this field when you do an advance or expert text search. This is a required field.
Interaction Detail
The Interaction Detail notebook is based on a classification structure, such as a cost code and closure analysis, to classify interaction records for reporting purposes. This is a required field. This field describes the type of interaction. The interaction type determines the process to escalate to when the interaction cannot be solved on first intake. The categories are based on ITIL service-centric processes, and therefore focus on enabling ticket assignment, reporting, and operational analysis for knowledge management purposes. From the category dropdown: Complaint > Escalate Service Manager creates a new incident. Incident > Escalate You can relate the interaction to an existing incident, an existing known error, or create a new incident. Request for Change > Escalate Service Manager creates a new change request. Request for Information > Escalate Service Manager creates a new incident. Options menu > Order from Catalog Service Catalog opens, allowing you to place an order. The interaction is given the category service catalog. Service Catalog interactions are not escalated. When you approve the interaction, it opens the related record as defined in the service catalog connector.
For more information on Categories and the areas and subareas associated with them, see Interaction categories on page 50. This is a required field. Interaction Detail > Area The Service Desk Agent populates this field with the area of concern. Service Manager displays different lists of areas, depending on the category you selected. For more information on categories and the areas and subareas associated with them, see Interaction categories on page 50. This is a required field. Interaction Detail > Sub-area The third level of classifying an interaction, mainly used for reporting purposes. Service Manager displays different lists of sub-areas, depending on the area you selected. For more information on categories and the areas and sub-areas associated with them, see Interaction categories on page 50. This is a required field.
46
Chapter 4
User Interaction Management form details Description The Service Desk Agent populates this field with the impact the interaction has on the business. The impact and the urgency are used to calculate the priority. The impact is based on how much of the business is affected by the issue. The stored value can be 1-4, as follows. 1 - Enterprise 2 - Site/Dept 3 - Multiple Users 4 - User
This is a required field. Interaction Detail > Urgency The urgency indicates how pressing the issue is for the service recipient. The urgency and the impact are used to calculate the priority. The stored value can be 1-4, as follows. Interaction Detail > Priority 1 - Critical 2 - High 3 - Average 4 - Low
This is a required field. This field describes the order in which to address this interaction in comparison to others. It contains a priority value calculated by (impact + urgency)/2. Decimals are truncated. The stored value based on that calculation can be 1-4, as follows: Interaction Detail > Knowledge Source 1 - Critical 2 - High 3 - Average 4 - Low
This field contains the reference number of the document from the knowledgebase document used to solve the issue. If you find a knowledge article by using Search Knowledge, and then click Use Knowledge in that article to provide the solution to your customer, this field is populated with the Document ID of the document you used. If you do not use a knowledge document or if you do not click Use Knowledge in the knowledge document, this field is left blank.
47
User Interaction Management form details Description This field contains a predefined closure code, describing the way this issue has been solved. The out-of-box options in this field are based on Service Manager customer reference data. Tip: You may want to tailor these options to match your business needs. These closure codes are available out-of-box: Not Reproducible Out of Scope Request Rejected Solved by Change/Service Request Solved by User Instruction Solved by Workaround Unable to solve Withdrawn by User
This field contains a description of the solution used for this interaction. Note: Service Manager searches this field when you do an advance or expert text search. Service Manager populates this field with a predetermined status when a Service Desk Agent closes or escalates and interaction. The options in this field have been revised to align with our new best practices. Tip: You may want to tailor these options to match your business needs. These statuses are available out-of-box: Open-Idle The interaction has no incidents, changes, or other records related to it. The call has been opened, but not escalated or closed. For example, when the Service Desk Agent is still on the phone with the customer, or when a self-service user has created a request. Open-Linked The call has been escalated or the catalog request approved and the interaction is now related to another record, such as an incident, change, or request. Open-Callback There is an action pending for the interaction. The Service Desk Agent must now call the contact. When the related record is closed, the interaction is automatically set to open-callback. if the Notify By field is set to telephone for that user. Closed The interaction was closed by the help desk or automatically after the related record was closed.
Approval Status
This field is only used when you request something from the catalog. When you submit an order from the catalog, Service Manager automatically creates an interaction which, based on approval requirements, may have to be approved before it can be fulfilled. Service Manager populates this field with the current approval status for this interaction. These approval statuses are available out-of-box: Pending The request has not been approved or a prior approval or denial has been retracted. Approved All approval requirements are approved, or no approval necessary Denied The request has been denied.
48
Chapter 4
User Interaction Management form details Description The Activities notebook records information that the Service Desk Agent enters during the lifecycle of the ticket. Every time you update an interaction, you must fill in an update on the Activities notebook (Update sub-notebook). A log of all the updates is stored on the Journal Updates and Historic Activities tabs. Activities from related records that are flagged as customer visible are also displayed here. The Related Records notebook contains a list of all related records for the interaction. These may include related incidents, known errors, changes, and quotes. The SLA (Service Level Agreement) notebook displays SLAs related to the interaction. SLAs in interactions are customer-related and selected, based on the customer contact or department and service related to the issue. The Service Level Objective (SLO) defines the details, such as beginning and ending state, and time allowed between these states. SLA selection takes place when a Service Desk Agent escalates the interaction. The best practice is that the Service Desk Agent should communicate the time of the next breach to the customer at this point. If SLAs are configured to be handled in the background, the information on this tab may not display immediately. Note: The out-of-box system is set up to run SLAs in the foreground. Tailoring the system to run SLAs in the background complicates communicating with the customer and should be avoided.
Escalate button
The Service Desk Agent clicks this button to create an incident from this interaction. The customer's issue could not be solved immediately. When research time is required, the ticket should be escalated to an incident or a change, not saved as an interaction. There is no monitoring on saved interactions, other than self-service interactions. If the Service Desk has a role in the Incident Management process, this incident may be assigned to the Service Desk, and the Service Desk Agent can still work on it. Clicking Escalate starts the Escalate Interaction wizard. Tip: You may want to tailor the Escalate Interaction - Incident wizard to prepopulate desired information. For more information on the Escalate Interaction wizard, see Escalate Interaction wizard on page 52
Undo button
The Service Desk Agent clicks this button to reload the last saved version of a submitted self-service ticket, or to clear all data from the screen. Note: All changes after the last save will be lost. The Service Desk Agent clicks this button to close the interaction. The customer's issue was resolved and requires no further action.
Close button
49
Interaction categories
The category hierarchy was designed to support the ITIL V3 model of service-centric support. It is a natural-language-based hierarchy meant to enable the Service Desk Agent to easily classify the ticket. The three-level hierarchy (category, area, and sub-area) creates a sentence that clearly and uniquely defines the issue without ambiguity. The category determines which process the record belongs to. Combined with the area and subarea, it also is used for to report results and to determine the knowledgebase assignment for the event. Since the category values represent best practices, customizing this data is not expected. The area and subarea fields can be customized; however, they should cover the scope of the IT Service provisioning in natural language definition and should remain unmodified. If you choose to customize the areas and subareas, be sure to set them up in a natural easy-to-follow hierarchy. The categories, areas, and subareas that come with Service Desk out-of-box are captured in this table. Table 4-2 Category complaint complaint complaint complaint complaint complaint incident incident incident incident incident incident incident incident incident incident incident incident incident incident incident Categories, areas, and subareas Area service delivery service delivery service delivery support support support access access data data data data failure failure failure failure hardware hardware performance performance security Sub-area availability functionality performance incident resolution quality incident resolution time person authorization error login failure data or file corrupted data or file incorrect data or file missing storage limit exceeded error message function or feature not working job failed system down hardware failure missing or stolen performance degradation system or application hangs security breach
50
Chapter 4
Table 4-2 Category incident incident problem problem problem problem problem problem problem problem problem problem problem problem problem problem problem problem problem request for change request for change request for information request for information request for information service catalog
Categories, areas, and subareas (contd) Area security security access access data data data data failure failure failure failure hardware hardware performance performance security security security service portfolio service portfolio general information how to status service catalog Sub-area security event/message virus alert authorization error login failure data or file corrupted data or file incorrect data or file missing storage limit exceeded error message function or feature not working job failed system down hardware failure missing or stolen performance degradation system or application hangs security breach security event/message virus alert new service upgrade / new release general information how to status service catalog
51
52
Chapter 4
The HP Service Manager Incident Management application, referred to as Incident Management throughout this chapter, supports the Incident Management process. It provides comprehensive Incident Management that allows you to restore normal service operation as quickly as possible and minimize the adverse impact on business operations. Incident Management enables you to categorize and track various types of incidents (such as service unavailability or performance issues and hardware or software failures) and to ensure that incidents are resolved within agreed on service level targets. This section describes how Incident Management implements the best practice guidelines for the Incident Management processes. Topics in this section include: Incident Management within the ITIL framework on page 54 Incident Management application on page 54 Incident Management process overview on page 55 Input and output for Incident Management on page 57 Key performance indicators for Incident Management on page 58 RACI matrix for Incident Management on page 59
53
54
Chapter 5
55
Figure 5-1
56
Chapter 5
Customer interactions with the Service Desk, which can be escalated to incidents Event management tool, which automatically opens incidents Support staff. *
Incidents can also trigger several other Service Manager processes, as described in the next section.
Service Manager user roles assigned to staff who can open incidents directly include Incident Managers, Incident Coordinators, Configuration Auditors, Operators, Request Administrators, Request Procurement Managers, and System Administrators.
57
For completeness, the ITIL V3 and COBIT 4.1 KPIs are included below.
58
Chapter 5
Incident Manager
Activity
Incident Analyst
Incident Logging Incident Assignment Incident Investigation and Diagnosis Incident Resolution and Recovery Incident Closure Incident Escalation SLA Monitoring OLA and UC Monitoring Complaint Handling
C/I C/I I I
C/I
User
59
60
Chapter 5
The Incident Management process logs, investigates, diagnoses, and resolves incidents. Incidents can be initiated by the escalation of Service Desk interactions or automatically detected and reported by event monitoring tools. The process includes all necessary steps to log and resolve an incident, including any necessary escalations or reassignments. The Incident Management process consists of the following processes, which are included in this chapter: Incident Logging (process SO 2.1) on page 61 Incident Assignment (process SO 2.2) on page 64 Incident Investigation and Diagnosis (process SO 2.3) on page 67 Incident Resolution and Recovery (process SO 2.4) on page 70 Incident Closure (process SO 2.5) on page 72 Incident Escalation (process SO 2.6) on page 74 SLA Monitoring (process SO 2.7) on page 78 OLA and UC Monitoring (process SO 2.8) on page 81 Complaint Handling (process SO 2.9) on page 83
Operators and Service Desk Agents can perform the following Incident Logging tasks:
You can see the details of this process in the following figure and table.
61
62
Figure 6-1
Description A User interaction cannot be solved on first intake and is escalated to the Incident Management process. The interaction is automatically related to the newly created incident. The Service Desk Analyst creates an incident from an interaction. Is the incident categorized as a complaint? If yes, go to SO 2.1.5. If no, go to SO 2.1.3 Based on the categorization and the affected services, the incident is automatically assigned to the responsible support group. The Service Desk Analyst verifies that the assignment is correct. The Service Desk Analyst provides the interaction number to the User. The User keeps the interaction number as a reference to the incident. The Service Desk Analyst also provides a target solution date based on the SLA. Incidents categorized as complaints are initially assigned to the Service Desk Group. The Service Desk Analyst provides the interaction number to the User. The User keeps the interaction number as a reference to the incident. The Service Desk Analyst also provides a target solution date based on the SLA.
SO 2.1.2 SO 2.1.3
Categorized as complaint? Assign incident to group Provide interaction number and SLA target to User Assign complaint incident to Service Desk Group Provide interaction number and SLA target to User
SO 2.1.4
SO 2.1.5
SO 2.1.6
SO 2.1.7 SO 2.1.8
Assign incident to After saving, the incident is assigned to the Service Desk Manager Service Desk Manager (see SO 2.9 Complaint Management). Review incident information An incident can be rejected by an assignment group due to incorrect assignment or incomplete information. If this is the case, the Service Desk Analyst reviews the logged comments and corrects the information or assignment.
SO 2.1.9
Information complete? If no, go to SO 2.1.10. If yes, go to SO 2.1.3. All known errors will have a workaround. The Incident might only remain open for problem tickets. Additionally, the Incident Management process remains responsible. Gather required information Create new incident Gather the missing required information and update the incident with the information. Contact the User if necessary. An incident is detected when monitoring the Information and Communication Technology (ICT) infrastructure. The Operator (or Initiator) decides to open an incident ticket manually, or an incident ticket is opened automatically, depending on the settings.
SO 2.1.10 SO 2.1.11
SO 2.1.12 SO 2.1.13
Select incident The Operator (or Initiator) selects an incident template from a list, or template if appropriate a template is selected automatically, depending on the settings. Follow template instructions The Operator (or Initiator) provides and records the incident details based on the instructions provided by the incident template. The template instructions may filled in by predefined scripts.
Operator Operator
63
Incident Logging process (contd) Procedure or Decision Provide Title/ Description/CI Select Category and Priority Assign incident to group
Description Provide a suitable title and description for the incident. This might be based on the event text. If possible, the affected Configuration Item should be selected. Select the suitable Category and Priority by selecting the applicable impact level and urgency. The incident is automatically assigned to the responsible support group, based on the incident categorization and the associated affected services.
Role Operator
SO 2.1.15 SO 2.1.16
Operator Operator
64
Chapter 6
65
Figure 6-2
Description The Incident Coordinator monitors the incident queue and reviews all incoming Incidents.
Incident information The Incident Coordinator verifies that there is sufficient information complete and assigned available in the incident ticket to diagnose the incident and verifies to correct group? that the incident is assigned to the correct support group. If yes, continue with SO 2.2.3. If no, go to SO 2.2.8. Assign incident to analyst Review incident information Able to resolve incident? Accept incident Reject incident The Incident Coordinator accepts the incident and assigns it to an Incident Analyst from the Incident Coordinator's group for further investigation and diagnosis.
SO 2.2.3
Incident Coordinator
The Incident Analyst monitors the queue of incidents assigned to him/ Incident her and reviews the incoming incidents. Analyst The Incident Analyst reviews the assigned incident to see if he/she can resolve it. If yes, continue with SO 2.2.6. If no, go to SO 2.2.7. The Incident Analyst accepts the incident by changing the status to Accepted. The Incident Analyst rejects the incident by clearing the Assignee field, updating the Status field to Rejected, and then providing an update in the Activities tab that states the reason for the rejection. When the Incident Analyst completes the updates, the incident ticket is saved. The incident ticket is then returned to the incident queue for reassignment by the Incident Coordinator. The Incident Coordinator rejects the incident and reassigns it to the Service Desk. Incident Analyst Incident Analyst Incident Analyst
SO 2.2.8
Reject incident
Incident Coordinator
66
Chapter 6
The Incident Analyst asks the following questions to determine how to resolve an incident:
You can see the details of this process in the following figure and table.
67
68
Figure 6-3
Incident Investigation and Diagnosis process Procedure or Decision Review incident Request for information? Investigate and Diagnose Incident reproduced? Match to outstanding problem/known error? Incident caused by change?
Description
Role
The Incident Analyst monitors the queue of incidents assigned to him/ Incident her and reviews the incoming incidents. Analyst The Incident Analyst evaluates the incident to see if it is categorized as a Request for Information (RFI) or if it is a service disruption. If yes, continue with SO 2.3.11. If no, go to SO 2.3.3. The Incident Analyst starts to investigate and diagnose the cause of the incident. The status of the incident is set to Work in Progress. The analyst tries to reproduce the incident. If yes, continue with SO 2.3.5. If no, go to SO 2.3.8. The Incident Analyst searches the problem database to see if there is already a problem or known error defined for this incident. If yes, continue with SO 2.3.9. If no, go to SO 2.3.6. The Incident Analyst searches the changes database to see if a recent change may have caused the service disruption. If the configuration item associated with the incident is listed, the Incident Analyst can also look at any changes that have recently been performed against this configuration item. The Incident Analyst can also view the configuration item tree to discover if related configuration items could have caused the incident. If yes, continue with SO 2.3.10. If no, go to SO 2.3.7. The Incident Analyst checks the known error/knowledgebase for a workaround or resolution to this incident, or tries to find a solution. If yes, continue with SO 2.3.8. If no, go back to SO 2.3.3. The Incident Analyst documents the solution or workaround in the incident ticket. When an incident matches an outstanding problem or known error, the incident ticket is related to the problem ticket or known error record. When the incident is caused by a previous change, the incident ticket is related to the change request. A solution still needs to be found to solve the incident. The Incident Analyst searches for information to provide the requested information to the User. Incident Analyst Incident Analyst Incident Analyst Incident Analyst Incident Analyst
SO 2.3.6
SO 2.3.7
Resolution found?
Incident Analyst Incident Analyst Incident Analyst Incident Analyst Incident Analyst
Document resolution/ workaround Relate incident to problem/known error Relate incident to change Search for/collect information
SO 2.3.11
69
You can see the details of this process in the following figure and table.
70
Chapter 6
Figure 6-4
71
Incident Resolution and Recovery process Procedure or Decision Review incident Change required to resolve incident? Analyst entitled to implement resolution? Implement resolution Errors occurred?
Description The Incident Analyst reviews the incident information for the supplied resolution or workaround. The Incident Analyst determines whether or not the provided resolution needs to be implemented by using a Change. If yes, go to SO 2.6. If no, continue with SO 2.4.3. The Incident Analyst must judge if he/she has the permissions to implement the resolution. If yes, continue with SO 2.4.4. If no, go to SO 2.4.7. The Incident Analyst tests the resolution and implements it in the production environment. When there are errors during the implementation of a resolution, the Incident Analyst reverses the solution and the incident is returned to the investigation and diagnosis phase. If yes, go to SO 2.4.6. If no, continue with SO 2.5. Determine if escalation to the Incident Coordinator is required at this point in the resolution process. If yes, go to the Incident Escalation process. If no, go to SO 2.3.3. When the Incident Analyst is not entitled to implement the solution, the analyst must reassign the incident to a support group that can implement the solution.
Role Incident Analyst Incident Analyst Incident Analyst Incident Analyst Incident Analyst
SO 2.4.3
SO 2.4.4 SO 2.4.5
SO 2.4.6
Escalation required?
SO 2.4.7
72
Chapter 6
Figure 6-5
73
Incident Closure process Procedure or Decision Review incident Verify and confirm resolution Incident solved? Close incident
The Incident Analyst verifies that the resolution is correct and Incident complete and confirms the resolution. If required, the Incident Analyst Analyst is entitled to contact the User (see SO 2.7.3) to validate the resolution. Is the incident solved with the offered resolution? If yes, continue with SO 2.5.4. If no, go to SO 2.5.7. The Incident Analyst closes the incident ticket and selects the applicable resolution code. Incident Analyst Incident Analyst Incident Analyst Incident Analyst Incident Analyst
Incident initiated by an Was the incident initiated by an event? If yes, then the event must be event? confirmed by using the event management process. If no, go to SO 2.5.6. Incident initiated through an interaction? Reopen change? Was the incident initiated by an interaction? If yes, continue with the Interaction Closure process. If no, then stop. Was the resolution implemented by using a change that must be reopened? If yes, continue with the reopen change process. If no, go to SO 2.5.8.
SO 2.5.6
SO 2.5.7
SO 2.5.8
Was the resolution implemented by using a service request that must Incident be reopened? If yes, continue with the reopen change process. If no, go Analyst to the incident assignment process.
When an incident is escalated, the escalation should continue up the management chain. Senior managers are notified of the situation so that they can prepare to take any necessary actions, such as allocating additional resources or involving suppliers. You can see the details of this process in the following figure and table.
74
Chapter 6
Figure 6-6
75
76
Description The Incident Coordinator gathers information from the Incident Analyst(s) about the status of the incident resolution and determines how the incident can best be resolved. The Incident Coordinator verifies that the expected resolution time matches any agreed on level, such as that specified in an SLA.
Change Management required? Service request needed? Enable Incident Analysts to solve incident Request service request Determine expected resolution time Determine and execute escalation actions
Is a change required to solve the incident? If yes, continue with SO 2.6.7. If no, go to SO 2.6.3. Is it possible to solve the incident with a service request? If yes, continue with SO 2.6.5. If no, go to SO 2.6.4. The Incident Coordinator enables the Incident Analyst(s) to focus solely on the resolution of the incident and provides the Incident Analyst(s) with all means necessary to speed up the resolution. Go to SO 2.4.4. The Incident Coordinator completes a service request to implement the proposed resolution by using the request fulfillment process.
Incident Coordinator
The Incident Manager verifies that the expected resolution time meets Incident SLA targets. Manager The Incident Manager determines the actions to be performed to solve Incident the incident within target times and designates escalation personnel to Manager contact in the event of an escalation. This can include determining that the Service Desk is required to send an information bulletin to the affected users and stakeholders. If yes, go to SO 2.6.9. If no, go to SO 2.6.10. Incident Manager
SO 2.6.8
Description Based on the Incident Manager's request, the Incident Coordinator registers an emergency change request and contacts the Change Manager to inform the manager about the request, thereby starting the Emergency Change Handling process. Is it necessary to reassign the incident to a different support group with more knowledge (that is, a functional escalation)? If yes, continue with SO 2.6.11. If no, then stop. The Incident Manager reassigns the incident to another 2nd-line or 3rd-line support group.
Role
Incident Coordinato
SO 2.6.10
SO 2.6.11
77
Figure 6-7
78
Chapter 6
Description Has the SLA target date/time been exceeded for this interaction? If yes, start the Incident Escalation process (SO 2.6.7). If no, go to SO 2.7.2.
SO 2.7.2 SO 2.7.3
SLA breach within 1 hour Work with Incident Coordinator(s) to see if incident can still be solved on time Will related incident be solved on time? Communicate related incident status to all affected Users SLA breach within 4 hours? Monitor queue Communicate related incident status to all affected Users SLA breach within 1 day? Monitor queue Related incident closed?
Does the interaction need to be solved within 1 hour to reach the SLA Service Desk target date/time? If yes, go to SO 2.7.3. If no, go to SO 2.7.6. Agent Contact the Incident Coordinator with the related incident assigned to his/her group. Determine whether the group is able to solve the incident on time without further support. If yes, the Incident Coordinator of the assigned group estimates that the related incident can still be solved on time, go to SO 2.7.5. If no, go to SO 2.6.7 to escalate the incident immediately. Identify which Users or user groups are affected by the related incident. Send a communication bulletin to inform all affected Users of the incident status and expected resolution time. Does the interaction need to be solved within 4 hours to reach the SLA target date/time? If yes, go to SO 2.7.7. If no, go to SO 2.7.9. Monitor the interactions within the Breach within 4 hours queue. Identify which Users or user groups are affected by the related incident. Send a communication bulletin to inform all affected Users of the incident status and expected resolution time. Does the interaction need to be solved within 1 day to reach the SLA target date/time? If yes, go to SO 2.7.10. If no, go to SO 2.7.11. Monitor the interaction within the Breach within 1 day queue. If yes, no further action is required. If no, go to SO 2.7.1. Service Desk Agent
SO 2.7.4
Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent Service Desk Agent
SO 2.7.5
79
Figure 6-8
80
Chapter 6
OLA and UC Monitoring process Procedure or Decision Check status and progress of incident
Description Check status and progress of incident resolution. Verify that the incident will be resolved before the target date and time specified in applicable Operation Level Agreement (OLA) and Underpinning Contract (UC). External circumstances (for example, end of work shift, illness, or holiday) could cause an assigned Incident Analyst to become unavailable. If yes, go to SO 2.2.3. If no, go to SO 2.8.4. If yes, start the Incident Escalation process (SO 2.6). If no, go to SO 2.8.5. If yes, go to SO 2.8.6. If no, go to SO 2.8.8.
SO 2.8.2
Assigned Incident Analyst available? Reassignment required? Applicable OLA or UC breached? Expected OLA/UC breach within 1 hour?
Get status update from Contact the assigned Incident Analyst to receive a status update of the Incident incident. If the incident is reported to a vendor, contact the vendor for Coordinator Incident Analyst and vendor (if applicable) a status update. Will the incident be solved on time? The Incident Coordinator estimates whether or not the incident can still be resolved on time. If yes, go to SO 2.8.4. If no, go to SO 2.6.7 to escalate the incident immediately. Incident Coordinator Incident Coordinator
SO 2.8.7
SO 2.8.8
Expected OLA/UC Does the incident need to be resolved within 4 hours to reach the breach within 4 hours? OLA/UC target date/time? If yes, go to SO 2.8.9. If no, go to SO 2.8.11.
SO 2.8.9
Get status update from Contact the assigned Incident Analyst to receive a status update of the Incident Incident Analyst and incident. If the incident is reported to a vendor, contact the vendor for Coordinator vendor (if applicable) a status update. Take follow-up actions if required Expected OLA/UC breach within 1 day? The Incident Coordinator determines whether follow-up actions are Incident required to resolve the incident according to the OLA/UC. If required, Coordinator the Incident Coordinator performs the required actions. If yes, go to SO 2.8.12. If no, go to SO 2.8.14. Incident Coordinator
SO 2.8.10
SO 2.8.11 SO 2.8.12
Get status update from Contact the assigned Incident Analyst to receive a status update of the Incident Incident Analyst and incident. If the incident is reported to a vendor, contact the vendor for Coordinator vendor (if applicable) a status update. Take follow-up actions if required Incident closed? The Incident Coordinator determines whether follow-up actions are Incident required to resolve the incident according to the OLA/UC. If required, Coordinator the Incident Coordinator performs the required actions. If yes, no further action is required. If no, go to SO 2.8.4. Incident Coordinator
SO 2.8.13
SO 2.8.14
81
Figure 6-9
Complaint Handling process Procedure or Decision Review complaint information Accept complaint Investigate complaint cause
Description The Service Desk Manager monitors the incident queue and reviews assigned incidents. The Service Desk Manager checks the contents of the complaint. The Service Desk Manager accepts the incident ticket to investigate the cause of the complaint. The Service Desk Manager investigates the cause of the complaint by looking at the relevant information and talking to the people involved. The Service Desk Manager also searches for an answer or solution to satisfy the user who filed the complaint. The Service Desk Manager contacts the user to solve the user's issue and tries to reach an agreement. The Service Desk Manager updates the incident ticket with the agreed on details and closes the incident ticket.
Role Service Desk Manager Service Desk Manager Service Desk Manager
SO 2.9.2 SO 2.9.3
SO 2.9.4 SO 2.9.5
82
HP Service Manager uses the Incident Management application to enable the Incident Management process. The main function of Incident Management is to monitor, track, and record calls and open incidents as necessary. In Incident Management, an Incident Analyst investigates, diagnoses, and proposes solutions for incidents. The Incident Analyst escalates those incidents requiring a change to the Incident Coordinator. This section describes selected Incident Management fields in the out-of-box Service Manager system. Topics in this section include: Incident form after escalation from Service Desk on page 86 Update incident form on page 87 Incident Management form details on page 88
85
Figure 7-1
86
Chapter 7
Figure 7-2
87
The name of the person assigned to work on this incident. This person is a member of the assigned support group. Assignees may belong to one or multiple assignment groups, based on the needs of your company. The name of the vendor the incident is assigned to. Used when a vendor needs to be involved in fixing the incident. This number refers to the incident number from the vendors logging system. This is an informational field for reference only.
88
Chapter 7
Incident Management form details (contd) Description The support group assigned to work on this incident. The service specified in the interaction form determines which default assignment group the system assigns to incidents that were escalated from interactions. An administrator assigns the default assignment group for a service on the Configuration Item (CI) detail form for the CI. When you search for the service in Configuration Management (Configuration Management > Resources > Search CIs), you see the default assignment group for the service specified in the Config admin group field. When you escalate an interaction to an incident, the assignment group is prepopulated, based on the service selected in the interaction. You can change the assignment group, if necessary. If you use the escalation wizard, assignment has both default and allowed groups as defined for the service, as well as the default group for the CI, if one has been registered. The out-of-box data consists of default assignment groups for use as examples of types of assignment groups. Tip: You may want to adapt the sample assignment groups to meet your own needs. These assignment groups are available out-of-box: Application Email / Webmail Field Support Hardware Intranet / Internet Support Network Office Supplies Office Support Operating System Support SAP Support Service Desk Service Manager
This is a required field. Affected Items Service The service affected by this incident. This field is populated with data from the interaction record. See User Interaction Management form details on page 44 for additional information. This is a required field. Affected Items Affected CI Affected Items Critical CI The configuration item (CI) that is affecting the service negatively. This field is populated with data from the interaction record. See User Interaction Management form details on page 44 for additional information. If selected (set to true), indicates that the affected Configuration Item (CI) is critical to normal operations. If the CI you specify has been marked as a critical CI by an administrator, the system marks this check box. You cannot modify this field on the incident form. It can only be changed by modifying the applicable CI device record. If the CI you select has been marked as Pending Change in the Configuration Management device record, the system marks this check box. This field indicates that there is a change pending for this CI. You cannot modify this field on the incident form. It can only be changed by modifying the applicable CI device record.
89
Incident Management form details (contd) Description If selected (set to true), indicates that the item is currently operational and that there is no outage. By default when you open an incident against a CI, the CI is flagged as down. If the CI is still working, you should mark this field. The date and time when the outage started. The outage start and outage end times are used to measure availability for the Service Level Agreements (SLAs). If the CI is flagged as down, availability SLAs start counting against the CI. The availability value defaults to the incident open and close times, but you should change this to report the actual outage start and end times because it may be several minutes or hours before the incident is opened or closed. For example, the device may have gone down in the night and the incident is not opened until someone reports the problem. In this case, the default open time does not accurately reflect the outage time. The date and time of when the outage ended. The outage start and outage end times are used to measure availability for the SLAs. If the CI is flagged as down, availability SLAs start counting against the CI. The availability value defaults to the incident open and close times, but you should change this to report the actual outage end times. For example, the CI may become operational after it is restarted, but it may take several minutes or hours for someone to update the record to report that the incident is closed. In this case, the default close time does not accurately reflect the actual outage time. The location for which the incident has been reported. This field is prepopulated with data from an escalated interaction. The field is for informational purposes only. Location data is customer and implementation specific. A short description summarizing the incident. This field is prepopulated with data from an escalated interaction. This is a required field. A detailed description of the incident. This field is prepopulated with data from an escalated interaction. This is a required field. This field describes the type of incident, based on ITIL service-centric processes. This field is prepopulated with data from the escalated interaction. For incidents assigned to them, the Incident Coordinator, Incident Manager, and Incident Analyst can update this field and the related area and subarea fields, if required. The out-of-box data is the same as in Interaction Management. For additional information, see User Interaction Management form details on page 44 and Interaction categories on page 50.
Location
Title
Description
This field is prepopulated with data from an escalated interaction. The area selections depend on the category. The out-of-box data is the same as in Interaction Management. For additional information, see User Interaction Management form details on page 44 and Interaction categories on page 50.
90
Chapter 7
Incident Management form details (contd) Description The third level of classifying an interaction, mainly used for reporting purposes. This field is prepopulated with data from an escalated interaction. Service Manager displays different lists of subareas, depending on the area selected. For more information on categories and the areas and subareas associated with them, see Interaction categories on page 50. This is a required field. The out-of-box data is the same as in Interaction Management. For additional information, see User Interaction Management form details on page 44.
This field is prepopulated with data from an escalated interaction. It specifies the impact the incident has on the business. The impact and the urgency are used to calculate the priority. These impacts are available out-of-box: 1 - Enterprise 2 - Site/Dept 3 - Multiple Users 4 - User
This field is prepopulated with data from an escalated interaction. The urgency indicates how pressing the incident is for the organization. The urgency and the impact are used to calculate the priority. For additional information, see User Interaction Management form details on page 44. The order in which to address this incident in comparison to others. The priority value is calculated using initial impact and urgency. This field only appears for incidents being updated or escalated from interactions. Specifies the contract covering the affected equipment. This field is populated, based on the Service Level Agreement (SLA) information. The SLA records contain service contract information so when an SLA applies to an incident, the service contract is also populated according to the SLA. Note: In the current out-of-box system, no SLAs are defined with a Service Contract. Therefore, no out-of-box values are available for this field. Service contracts are financial agreements that define the services to be provided and the financial implications of using those services. This information is used to: Charge the customer for costs incurred while working with incidents, handling service desk interactions, or implementing changes to a specific service contract. Link discrete incidents and interactions to service contracts to provide up-to-date information about the state of each contract, including its budgeted allocations and the actual number of interactions and incidents applied against each contract. Associate service contracts with time and materials expended through Service Desk, Incident Management, and Change Management to compute the real cost of handling each incident and service desk interaction, as well as to calculate the cost of managing each service contract.
91
Incident Management form details (contd) Description The date and time when the next Service Level Objective (SLO) expires. This field is populated based on the SLOs that match the incident information. The date used is the closest SLO to a breach before the agreement is breached. For example, if there are two SLOs for that incident and one expires in one hour and the other expires in one week, this field contains the value of current time+1hr. This field is the same as the Next Expiration field that appears on the SLA notebook tab.
This system-generated field displays the alert status of the incident as it progresses through the processing stages. These alert statuses are available out-of-box: open updated closed reopened resolved
Note for legacy users: Alert stage 1, 2, 3, and Deadline alert are calculated based on the category settings. In the out-of-box system, these calculations are not configured. If you enable category-based alerts, you see these additional values: Incident Detail > Problem Management Candidate alert stage 1 alert stage 2 alert stage 3 DEADLINE ALERT
If selected (set to true), this field indicates that the issue that caused the incident is most likely a problem. When selected, either a problem ticket should have been created, or the incident should have been associated with other problems or known errors. This field is only enabled for users who have rights to mark incidents as problem candidates. This capability is specified on the Incident Management Security Profile form. For the out-of-box system, these profiles include Incident Analyst, Incident Coordinator, Incident Manager, and Operator. When the Problem Management Candidate field is checked for the incident, the incident ticket appears in the Problem Manager default view for incidents. The Problem Manager can then review the incident to decide whether or not to open a related problem. Examples of problem candidates include cases where several customers report the same issue or where an issue recurs repeatedly.
92
Chapter 7
Incident Management form details (contd) Description This field is intended for customers who do not have the Knowledge Management (KM) module. If selected (set to true), this field indicates that the solution is useful for other incidents and should be stored in the knowledgebase. This field is used for Information Retrieval (the IR Expert core and protocore tables). When you close incidents marked as solution candidates, the candidate (protocore) file fills. Knowledge engineers examine these proposed solutions and promote them to the central knowledgebase (core), if applicable. The IR Expert is disabled out-of-box for the installations that have the KM module. Customers who do have the KM module can search in the incident library for an incident. If you have the rights, you can create a knowledge article from an existing incident.
Specifies a predefined closure code to describe how the incident has been resolved. The out-of-box options in this field are based on customer reference data. Tip: You may want to tailor these options to match your business needs. These closure codes are available out-of-box: Not Reproducible Out of Scope Request Rejected Solved by Change/Service Request Solved by User Instruction Solved by Workaround Unable to Solve Withdrawn by User
Provides a description of the solution for the incident. This notebook tab provides a list of affected services for the incident ticket. When a configuration item for the incident is added or updated, a schedule record is created that runs a routine to update the list of affected services. If the incident ticket is locked, the routine reschedules the schedule record for 5 minutes later. This notebook tab provides a list of response SLOs related to the incident. The information includes SLA title, status, SLO name, From and To specifications for the SLA, and Expiration. Similar information is available for interactions, problems, and changes.
93
Incident Management form details (contd) Description This notebook tab displays uptime availability data for the SLOs related to the incident. The data displayed includes the following information: Status SLO name Required Monthly Uptime (%) Withdrawn by User Current Uptime this Month (%) Next Expiration Affected CI SLO ID
Similar information is available for interactions, problems, and changes. SLA > Max Duration Objectives This notebook tab displays duration availability data for the SLOs related to the incident. The data displayed includes the following information: SLA > Upcoming Alerts Status SLO name Total outages this month Average outage duration Next expiration Affected CI SLO ID
Similar information is available for interactions, problems, and changes. This notebook tab displays all upcoming SLA alerts to help users prioritize the incidents needing attention. The data displayed includes the following information: Alert name SLO name Alert time
Note: For additional information, see the online Help topic, Service Level Agreement alerts.
94
Chapter 7
The HP Service Manager Problem Management application, referred to as Problem Management throughout this chapter, supports the entire Problem Management process. Problem Management provides comprehensive Problem Management that allows you to find, fix, and prevent problems in the IT infrastructure, processes, and services. Problem Management prevents problems and their resulting incidents, eliminates recurring incidents, and minimizes the impact of those incidents that cannot be prevented. It maximizes system availability, improves service levels, reduces costs, and improves customer convenience and satisfaction. This section describes how Problem Management implements the best practice guidelines for the Problem Management processes. Topics in this section include: Problem Management within the ITIL framework on page 96 Problem Management application on page 96 Problem Management process overview on page 97 Input and output for Problem Management on page 101 Key performance indicators for Problem Management on page 102 RACI matrix for Problem Management on page 103
95
By actively preventing incidents, instead of just reacting to them, an organization provides better service and higher efficiency.
96
Chapter 8
97
Figure 8-1
98
Chapter 8
Figure 8-2
Error Control, which falls entirely under the Problem Resolution phase, identifies a solution that is then delivered by the Change Management application. This workflow from the Problem Management application shows how a known error moves through Problem Management. Each box represents a phase of the process.
Figure 8-3
The Problem Management phases listed below are described in detail in the Problem Management Workflows. Problem Detection, Logging, and Categorization (process SO 4.1) on page 105, includes the activities involved in finding and then describing the problem. Problem Prioritization and Planning (process SO 4.2) on page 109, includes the activities necessary to prioritize the problems, and to plan the investigation and resolution activities. Problem Investigation and Diagnosis (process SO 4.3) on page 111, includes the activities that identify the root cause of problems. You can create problem tasks in this phase. Each task belongs to a phase. All the tasks associated with a phase must be completed before the problem ticket can move to the next phase. A problem task is assigned to a person who is responsible for completing it. Problem Resolution includes all Error Control activities, from recording the known error to resolving it. Generally you can expect a one-to-one relationship between problems and known errors, but there can be exceptions. Service Manager allows more than one known error to be associated with a problem, and also allows multiple problems to be associated with a particular known error. Known Error Logging and Categorization (process SO 4.4) on page 115, includes the activities necessary for creating and categorizing known error record. Known Error Investigation (process SO 4.5) on page 118, includes the activities necessary for finding a temporary fix or permanent solution for the known error. You can create known error tasks in this phase. All of the tasks associated with a phase must be completed before moving to the next phase.
Problem Management Overview 99
Known Error Solution Acceptance (process SO 4.6) on page 121, includes the activities necessary for reviewing and approving the solution for implementation. You cannot close a known error if there is a related Change open. You can create a Change Request during this phase. Known Error Resolution (process SO 4.7) on page 124, includes the activities by which stakeholders can ensure that a fix for a known error is implemented. You can only create a change request during the known error processes, not during the earlier Problem Management processes. It is only at that point that you have enough information to describe the change that must be made in order to resolve the problem. Problem Closure and Review (process SO 4.8) on page 127, includes the activities involved in determining whether the problem and all related known errors have been resolved, seeking improvements to the process, and preventing recurrence of incidents or mistakes.
100
Chapter 8
Input to Problem Management Incidents for which the cause is not known and/or incidents that are likely to recur (from incident Management) Incidents that reveal that an underlying problem exists (for example, an application error or bug) Notification from a supplier or product manager that a problem exists (for example, from a development team or supplier known error database) Potential security breaches of products deployed in the IT environment (for example, from suppliers or security analysts). Analysis of incident trends and history (that is, proactive Problem Management) Incident Management Incidents classified as problem candidates Trend analysis and review of closed incidents (for which a workaround has been used to resolve the incident) Incident reports (trends, summary) Event management Trend analysis and review of events (for example, performance events) Error logs Configuration management Configuration details and relationships (service model) Change management RFC and change request status, approval and closure. Security management Notification of potential security breaches that require resolution. Suppliers (external providers) Notification of problems from suppliers/vendors.
Note: Information on workarounds, permanent fixes, or progress of problems should be communicated to those affected or required in order to support the affected services.
101
For completeness, the ITIL V3 and COBIT 4.1 KPIs are included below.
102
Chapter 8
Number of open/new/closed problems, by severity Average and standard deviation of time lag between problem identification and resolution Average and standard deviation of time lag between problem resolution and closure Average duration between the logging of a problem and the identification of the root cause Percent of problems for which a root cause analysis was completed Frequency of reports or updates to an ongoing problem, based on the problem severity
Problem Manager
Problem Detection, Logging, and Categorization Problem Prioritization and Planning Problem Investigation and Diagnosis Known Error Logging and Categorization Known Error Investigation Known Error Solution Acceptance Known Error Resolution Problem Closure and Review Problem and Known Error Monitoring
R C R R R C R C C R R
Problem Analyst
Activity
104
Chapter 8
Problem Management includes the activities required to identify and classify problems, diagnose the root cause of incidents and to determine the resolution to related problems. It is responsible for ensuring that the resolution is implemented through the appropriate control processes, such as Change Management. Problem Management includes the activities required to prevent the recurrence or replication of incidents or known errors. It enables you to form recommendations for improvement, maintain problem tickets, and review the status of corrective actions. The Problem Management process consists of the following processes, which are included in this chapter: Problem Detection, Logging, and Categorization (process SO 4.1) on page 105 Problem Prioritization and Planning (process SO 4.2) on page 109 Problem Investigation and Diagnosis (process SO 4.3) on page 111 Problem Resolution (known error processes) on page 115 Problem Closure and Review (process SO 4.8) on page 127 Problem and Known Error Monitoring (process SO 4.9) on page 129
The incident(s) that initiated the problem ticket should be referenced, and relevant details copied from the incident ticket(s) to the problem ticket. The identified workaround or temporary fix as defined by the Incident Analyst is also captured, if available. Details for this process can be seen in Figure 9-1 and Table 9-1.
105
106
Figure 9-1
Procedure or Decision Description Review closed incidents Periodically, the Problem Coordinator must review the closed incidents to detect new problems or match incidents to existing problems that have not been resolved. Analysis of incident data may reveal that similar or reoccurring incidents are reported, which means that a permanent fix must be found. Select incidents since last review by using the following criteria: Major incidents (high impact) Incidents resolved through a workaround or temporary fix not matched to a problem. Suspected problems (as identified by stakeholders) Candidates for problems
All closed incidents not resolved through a permanent fix, temporary fix, or workaround need to be matched to existing problems, or a new problem must be created. Incident Management staff may already have linked incidents to existing problems (for example, if a workaround has been applied). SO 4.1.2 Incident due to an outstanding problem of known error? Verify whether the incident is caused by an outstanding problem or known error. If yes, go to SO 4.1.3. If no, go to SO 4.1.4. It is important to link incidents to existing problems to monitor the number of reoccurring incidents. This helps you to identify problems that are not resolved. The incident count is the number of times that this particular problem has resulted in an incident, and is updated in the problem ticket. The incident count influences the prioritization by giving an indication of the frequency of occurrence and thus the impact this issue is having on the business. Problem Coordinator
SO 4.1.3
If the incident is caused by an outstanding problem, the incident Problem must be linked to the problem ticket. If needed, the problem ticket is Coordinator updated and the Problem Analyst is notified (for example, when a workaround has been applied). If there is no previously established problem ticket, a new problem ticket is created (for example, based on the selected incident ticket). Details from the incident are copied to the problem ticket. A new problem can be created from a registered incident (reactively) or proactively by identifying problems and known errors before incidents occur. Problem Coordinator
SO 4.1.4
107
Procedure or Decision Description Capture problem details After a problem is identified or detected, it must be accurately recorded. The Problem Manager fills out the problem details (some fields are copied from the related incident). A brief description and detailed description are added or updated to define the problem in more detail. The problem must be described in terms of symptoms and impact of the problem from a business perspective. Recording problem details consists of the following activities: Determine affected service(s) and Configuration Items Determine impact on the business Provide an impact code and description Determine model, version, or CI types that have this particular problem Determine frequency of incident reoccurrence Determine the specific conditions under which a service disruption may occur
SO 4.1.6 SO 4.1.7
Determine the correct category for the problem ticket. Search for incidents that are caused by this problem. Link these incidents to the new problem.
Problem Coordinator Problem Coordinator, Incident Mgmt Staff Problem Coordinator Problem Coordinator
Verify whether a workaround or fix is available based on incident history. If yes, go to SO 4.1.9. If not, go to SO 4.1.10. Document the workaround captured from the related incident.
Review and complete the problem ticket details, including a Problem description. Save the problem ticket and update the problem phase to Coordinator Problem Prioritization, Assignment, and Scheduling. Service Manager then selects a default priority, based on the impact and urgency code. After that, update the phase to Problem Prioritization and Planning, and continue with activity Evaluate Problem Priority SO 4.2.1. Review event and monitoring data (for example, performance and availability trends). Identify potential problems, such as capacity and performance issues. Analyze the data provided by availability, capacity, and security management to determine potential problems. Problem Coordinator
SO 4.1.11
108
Chapter 9
Procedure or Decision Description Review vendor published issues Review information from suppliers periodically to identify problems and known errors (that is, the known errors discovered and published by providers). An example of such an item is a known security breach. After a potential problem has been detected through trend analysis or information provided by suppliers and development teams, determine if the issue has already been recorded as a problem or a known error. If yes, go to SO 4.1.14. If no, continue with SO 4.1.4. Update problem ticket (and any related known errors) with information and details captured from suppliers and other sources. After the update, the stakeholders and responsible Problem Analyst may need to be informed of new insights.
SO 4.1.13
Problem Coordinator
SO 4.1.14
Problem Coordinator
Discuss the problem with the stakeholders during a problem meeting decide whether to assign resources (with associated costs) and target dates to investigate the problem. Base the targets for resolution on priority level. Consider the following factors when scheduling the resolution of problems: Priority Skills available Competing requirements for resources Effort or cost to provide the method of resolution Duration of time to provide a method of resolution
Details for this process can be seen in Figure 9-2 and Table 9-2.
109
110
Figure 9-2
Procedure or Decision Description Evaluate problem priority The problem priority is evaluated based on the impact, urgency, severity, frequency and risk. For example, the frequency of reoccurring incidents may influence the urgency to resolve the problem; also a risk assessment may be required. Due to resource constraints, it is important to focus on those problems that have the highest impact on the business (for example, service availability, risks, and customer satisfaction). Discuss the problem with stakeholders during a problem meeting to agree on the priority of resolving the problem. Based on the review with stakeholders, determine whether the problem is correctly documented and categorized. If yes, continue with activity SO 4.2.4. If no, go back to activity SO 4.1.5 to update the problem details. After reviewing the problem with stakeholders, determine whether to continue with the problem investigation or defer the problem. If you want to continue with the problem investigation, go to SO 4.2.5. If not, go to SO 4.2.7. Determine the target dates for the problem milestones. Target dates are determined based on the priority and impact on affected services. This planning also considers whether an effective workaround or fix is available. The problem is assigned to the responsible group. Update problem to next phase Problem Investigation and Diagnosis. Inform the stakeholders of the planning and resources assigned to investigate the problem. Update the Problem Coordinator about the problem. Determine whether to close the problem or to defer the problem for a specified period of time (for example, to review the problem at a later phase). It is possible that no effort is currently planned to investigate the problem (for example, if the likelihood of recurrence is low). If the problem is not recognized as being an issue by stakeholders, close the problem and document the reason. Update the problem phase to Problem Closure and Review, and then continue with SO 4.8.8. If the problem is still relevant, continue with SO 4.2.8.
SO 4.2.2 SO 4.2.3
Discuss problem with stakeholders Problem correctly documented? Problem needs investigation?
SO 4.2.4
SO 4.2.5
Schedule problem
Problem Manager
SO 4.2.6
Inform stakeholders
SO 4.2.7
SO 4.2.8
Defer the problem for a specified period of time. Document the reason Problem and update the status of the problem to deferred status. Periodically the Manager Problem Manager reviews the deferred problems to determine appropriate actions.
112
Figure 9-3
Problem Investigation and Diagnosis process Procedure or Decision Coordinate root cause analysis
Description Determine the required skills and resources to investigate the problem. Create and assign problem tasks to Problem Analyst(s) responsible for root cause analysis. The due date for the assigned task is filled in by the Problem Coordinator. Additional resources can be used for this analysis (for example, contact suppliers and other specialists). Monitor the outstanding problem tasks. The Problem Analyst reviews the problem task, and investigates and diagnoses the problem. Determine workaround and find the root cause. If yes, continue with SO 4.3.4. If no, go to SO 4.3.5.
SO 4.3.2
SO 4.3.3 SO 4.3.4
Document the root cause in the problem task. The problem task can be Problem Analyst closed and the Problem Coordinator informed about the progress. Continue with SO 4.3.10. If yes, continue with SO 4.3.6. If no, continue with SO 4.3.9. Test the identified workaround to validate the suitability for resolving related incidents. If yes, go to SO 4.3.8. If no, go to SO 4.3.9. Update the workaround (in the known error and problem ticket) and inform stakeholders. The Problem Analyst determines whether he or she has the capabilities to investigate and determine the root cause of the problem (that is, skill level and available time). If yes, continue with SO 4.3.2. If no, go to SO 4.3.10. The Problem Analyst closes the task and documents the results. If applicable, the Problem Analyst also documents the reasons a root cause is not found. If the Problem Analyst cannot find the root cause he or she closes the task. Continue with activity SO 4.3.11. Problem Analyst Problem Analyst Problem Analyst Problem Analyst Problem Analyst
Workaround identified? Test workaround Workaround successful? Document workaround Continue with root cause analysis?
SO 4.3.10
Problem Analyst
SO 4.3.11
The Problem Coordinator validates the results of the problem task. If Problem Coordinator the root cause is determined, continue with SO 4.3.14. If not, go to SO 4.3.12 and determine whether additional resources are needed or if escalation is required. Determine whether additional resources are needed to investigate the cause of the problem. If yes, go to SO 4.3.13. If no, continue with SO 4.3.1. Problem Coordinator
SO 4.3.12
SO 4.3.13
Problem Escalate to the Problem Manager. Inform the Problem Manager that additional resources are needed to resolve the problem and modify the Coordinator phase of the problem to the previous phase (Problem Prioritization and Planning). Continue with SO 4.2.1.
113
Description
Role
Caused by outstanding Determine whether the root cause for this problem is related to an Problem known error? outstanding known error. If yes, continue with SO 4.3.15. If no, Coordinator forward the problem to the Problem Resolution phase, and then create a new known error record (see procedure SO 4.4.1). Relate problem to outstanding known error Inform Problem Manager The problem is moved to the Problem Resolution phase and linked to the existing known error record. The resolution of the problem is dependent on the resolution of this known error (already assigned to a Problem Coordinator). Inform the Problem Manager of the root cause and any dependency with another known error record. The resolution of the problem is dependent on the outstanding known error. Problem Coordinator
SO 4.3.15
SO 4.3.16
Problem Coordinator
114
Chapter 9
The known error activities are discussed in detail in each of the known error processes.
115
116
Figure 9-4
Known Error Logging and Categorization process Procedure or Decision Create new known error Determine categorization Workaround identified? Has the workaround been tested? Publish workaround Error caused by a change?
Description After the problem has been successfully diagnosed, a new known error record is created by using details from the problem ticket. Document the known error details, including the root cause and CIs that are at fault. Capture the categorization of the root cause, which is initially copied from the problem ticket. If applicable, a temporary workaround is also documented. If a workaround is identified, continue with SO 4.4.4. If not, continue with SO 4.4.6. Validate whether the workaround has already been tested. If tested, continue with SO 4.4.5. If not, continue with SO 4.4.6. Update the workaround documented in the known error and problem ticket, and inform stakeholders.
Role Problem Coordinator Problem Coordinator Problem Coordinator Problem Coordinator Problem Coordinator
SO 4.4.5 SO 4.4.6
Validate whether the error is introduced or caused by a recently implemented Problem change or release (that is, errors resulting from a change or incorrectly applied Coordinator change). Note: Errors are often caused by incorrectly applied changes. If the error is introduced by a recently applied change, the change may need to be undone or reopened. If the error is caused by a change, continue with SO 4.4.7. If not, continue with SO 4.4.9.
SO 4.4.7 SO 4.4.8
Associate known Relate the root cause to the original change that caused the problem. error to a change Inform Change Manager Continue with solution investigation Inform the Change Manager and determine corrective actions, such as undoing or redoing the change. Depending on the result of undoing or redoing the change, the solution investigation continues.
SO 4.4.9
Determine whether the known error must be investigated in more detail to find Problem a solution or workaround. If the known error requires further investigation, Manager continue with SO 4.5.1. If not, defer the problem according to action SO 4.4.10. An estimate of the resources and skills required for solution investigation and resolution are determined. This includes the number of required personnel days, duration, and additional costs. Verify whether the workaround available modifies the priority or planning for resolving the problem. If an effective workaround is found, the target dates to resolve the known error can be modified. If a workaround is not found, the priority of the known error can be raised. Update the planning and milestones for the solution investigation and resolution deadline. If required, the planning is discussed and reviewed with stakeholders. If the known error is not resolved, a decision must be made to continue with defining other solution candidates, or to defer the problem. The problem and known error are deferred for a specified period of time by assigning a low priority. After the specified period of time, the problem is reviewed to determine next steps. Problem Manager
117
118
Chapter 9
Figure 9-5
119
Description The Problem Coordinator assigns one or more known error tasks to Problem Analysts to investigate and determine appropriate solutions or fixes for the known error. Determine solution for the error. Determine possible workarounds or temporary fixes for the known error. Depending on the priority and impact of the known error, focus on defining a temporary fix that can be proposed or implemented within a short time frame.
Workarounds serve as a temporary alternative to provide restoration to the affected service, or as a temporary service improvement in cases where a permanent fix is not yet available or feasible. Determine solution candidates to resolve the known error. If the temporary fix must be implemented through a change, consider the fix as a solution candidate. The Problem Analyst determines whether he or she is able to resolve the error, or if additional resources are required (that is, skills and time). SO 4.5.3 Solution identified? If a solution candidate is found, continue with SO 4.5.4. If not, continue with SO 4.5.5. SO 4.5.4 Document proposed solution SO 4.5.5 Close known error task Problem Analyst
Finalize the solution documentation in the known error task. Make sure to Problem include necessary actions to implement the solution. Continue with SO 4.5.5. Analyst After completion, the Problem Analyst closes the task. The closure code marks the task as completed successfully, or not. The Problem Coordinator is notified of this event. Problem Analyst Problem Coordinator
SO 4.5.6 Review and Review the proposed solution, as identified by the Problem Analyst. The validate task results solution is defined in the task. Update the known error with the updates from the task. Determine whether the proposed solution is acceptable (for example, by testing or discussing with other technical specialists). If multiple solutions are defined, select the best solution. Make sure that the validation process includes the following considerations: SO 4.5.7 Known Error Investigation completed? Costs and resources needed to implement the solution Risks to implement the solution
Determine whether the investigation is completed and if a solution is identified and documented. If a suitable solution is identified (including cost and resource constraints), continue with SO 4.5.8, and then SO 4.6.1 If not, continue with SO 4.5.1. If a solution is successfully determined and if no workaround has yet been found, the Problem Coordinator (together with the Problem Manager) must assess whether there is still a need to find a workaround. If a permanent resolution can be implemented quickly, there may be no need to continue working on defining workarounds. If planning and implementing a permanent fix will take time or is too expensive, then work to identify an effective workaround should continue.
Problem Coordinator
Document the solution, including an impact assessment, an estimation of the costs, and resources required, to implement the solution.
Problem Coordinator
120
Chapter 9
Information on a workaround, permanent fixes, or progress of problems should be communicated to those affected or required in order to support affected services. In the case where a solution is not correct or not acceptable, the Problem Manager determines whether to continue to investigate the solution, or defer the known error and problem. Details for this process can be seen in the following figure and table.
121
122
Figure 9-6
Known Error Solution Acceptance process Procedure or Decision Verify solution with stakeholders Solution approved? Continue with solution investigation?
Description Review and validate the proposed solution. Discuss the cost and impact of the solution with stakeholders during a Problem Management meeting. If the solution is approved, go to SO 4.6.5. If not, continue with SO 4.6.3.
SO 4.6.2 SO 4.6.3
Determine whether to continue with the solution investigation phase Problem or defer the problem if no effective fix can be provided (for example, Manager due to financial and resource constraints). If you want to continue with the solution investigation phase, go to SO.4.5.1. If not, go to SO 4.6.4. The known error and related problem will be deferred for a specified period of time. Update the status (deferred), priority, and schedule of the problem and known error. Determine a date by which the problem and known error must be reviewed for additional actions. Determine whether the solution must be implemented through a formal change procedure. If yes, go to SO 4.6.6. If not, continue with SO 4.6.7. Prepare for the RFC by collecting details required for completion of the RFC. Follow the procedures, as defined by Change Management, to create the RFC. Determine whether the solution must be implemented through a standard request fulfillment procedure. If yes, go to SO 4.6.8. If not, continue with SO 4.6.9. Problem Manager
SO 4.6.4
SO 4.6.5
RFC required?
Problem Manager Problem Manager Problem Manager Problem Manager Problem Manager
SO 4.6.6
SO 4.6.7
SO 4.6.8
Prepare service request Prepare for the service request by collecting details required for completion of the request. Follow the procedures, as defined by request fulfillment, to create the service request. Schedule fix Schedule the implementation of corrective actions to resolve the known error. Assign the known error to the appropriate Problem Coordinator, and then continue with SO 4.7.1.
SO 4.6.9
123
Details for this process can be seen in the following figure and table.
124
Chapter 9
Figure 9-7
125
Known Error Resolution process Procedure or Decision Coordinate corrective actions Implement corrective actions
Description Assign tasks to Problem Analysts to execute the resolution tasks to resolve the known error. The Problem Analyst implements the solution or fix to remove the known error and thus prevent any recurrence of incidents. After completion, the task is closed and the Problem Coordinator is informed.
Known error resolved? Ensure that the known error is resolved. If yes, continue with SO 4.7.4. If not, go SO 4.7.5. Close known error Document results and proposed actions Change rejected? Change successful? Close known error Update the known error record (document actions taken), and then close the known error. Continue with SO 4.8.1. This action is triggered if the applied fix did not resolve the error. Document test results and determine appropriate actions. Inform the Problem Manager to determine next steps. Continue with SO 4.4.9. If the change is rejected, go to SO 4.7.9. If not, go to SO 4.7.7. If the change is successful (as verified by the change process), the known error can be closed (SO 4.7.8). If not, continue with SO 4.7.9. After the known error is resolved, the record is closed. Continue with SO 4.8.1 in the problem closure process.
Problem Coordinator Problem Coordinator Problem Coordinator Change Coordinator Change Coordinator Change Coordinator Change Coordinator
Inform Problem The Problem Manager is notified that the resolution has failed. Manager (and Problem Continue with SO 4.4.9 to determine next steps and appropriate Coordinator) actions.
126
Chapter 9
Improvements to the service or the Problem Management process should be recorded and fed into a service improvement plan. The information should be added to the Problem Management knowledgebase. All relevant documentation should be updated (for example, user guides and system documentation). Details for this process can be seen in the following figure and table.
127
128
Figure 9-8
Problem Closure and Review process Procedure or Decision All associated known errors closed?
Description Check whether all related known errors are closed or resolved. If all known errors are closed, update the Problem Management phase to Problem Closure and Review, and then continue with SO 4.8.2. If all known errors are not closed, the process ends.
SO 4.8.2
Validate whether the problem is resolved and continue with SO 4.8.3. Problem Depending on the nature of the problem, you may be required to keep Coordinator the problem open for a specified period of time (for example, for an evaluation period). If no incidents reoccur, the problem can be closed. If the problem is resolved, continue with SO 4.8.4. If not, continue with SO 4.2.1. In some cases, it becomes apparent that another error prevents the complete resolution of the problem (for example, when the problem is caused by multiple errors). In this case a new known error may have to be investigated. Determine whether a formal problem review is appropriate. If yes, continue with SO 4.8.5. If not, continue to SO 4.8.8. Initiate problem review activities and coordinate the formal review process. Include all parties involved in the Problem Resolution. Document the problem review results and lessons learned. Create a formal problem review report and inform the stakeholders. Update the problem ticket prior to closing the record. Ensure all information about the problem is complete and select a closure code. Inform stakeholders that the problem is resolved. Problem Coordinator
SO 4.8.3
Problem resolved?
Review required? Conduct problem review activities Document lessons learned Create problem review report Close problem Inform stakeholders of resolution
Problem Manager Problem Manager Problem Manager Problem Manager Problem Manager Problem Manager
129
130
Figure 9-9
Description
Existing problems or Periodically the problem and known error records are reviewed to evaluate known errors? the progress against the planning (and associated budget). The Problem Manager creates a list (or report) of all active problems and known errors. If there are any outstanding problems or known errors, go to SO 4.9.2. If not, then no further action is required. Review actual progress against planning The progress of the problem and known error activities is reviewed against the target dates, as communicated or agreed with stakeholders.
SO 4.9.2
SO 4.9.3
Milestone exceeded? Check whether a milestone has been (or is expected to be) exceeded. If so, go to SO 4.9.4. If not, continue with the next problem or known error in the list (SO 4.9.1). Escalation required? Check whether escalation is required. If not, continue with next problem or known error in the list (SO 4.9.1). If required, contact the Problem Coordinator or Problem Analyst for additional information (for example, estimate to complete time), and go to SO 4.9.5. The Problem Manager investigates the cause of delay and determines corrective actions (for example, assign additional resources or modify planning). Adjustments to the planning and actions are discussed with stakeholders. The progress is discussed with stakeholders to determine priorities and alternative plans. Determine whether to continue to spend resources on investigation or resolution of the problem. If required, additional resources are assigned (see SO 4.9.8). If continuation of the investigation is not feasible, the problem can be deferred (see SO 4.9.9).
SO 4.9.4
SO 4.9.5
SO 4.9.6
SO 4.9.7
SO 4.9.8
Update schedule and Update the planning and resources assigned to the problem or known error, assign resources and then continue with the next problem or known error in the list (SO 4.9.1). Defer problem and explain reasons Monitor deferred problems Problem resolved or no longer relevant? The problem and known error will be deferred for a specified period of time (low priority). After the specified period of time, the problem is reviewed to determine next actions. End of process. Periodically review the deferred problems to determine whether additional actions are required. The Problem Manager creates a list (or report) of all deferred problems.
SO 4.9.9
SO 4.9.10
SO 4.9.11
If the problem is resolved or no longer relevant, the problem can be closed. Problem Continue with SO 4.8.8 to close the problem. If not, go to SO 4.9.6 to Manager determine next steps.
131
Problem and Known Error Monitoring process (contd) Procedure or Decision Monitor deferred known errors
Description
Role
The Problem Manager periodically reviews the deferred errors to determine Problem whether circumstances have changed that require continuing with the Manager investigation and resolution. The Problem Manager creates a list (or report) of all deferred known errors. Problem Manager
SO 4.9.13
Known error Determine whether the known error is resolved (for example, due to an resolved or no longer upgrade or change) and whether the error is no longer relevant for the relevant? business. If the error is resolved, continue with SO 4.9.14 to close the known error. If not, continue with SO 4.9.6 to determine next steps. Close known error Continue with SO 4.8.1 to close the known error.
SO 4.9.14
Problem Manager
132
Chapter 9
HP Service Manager uses the Problem Management application to enable the Problem Management process. The main function of Problem Management is to identify and resolve problems and known errors. In Problem Management, the Problem Manager plans and prioritizes problems. The Problem Coordinator manages root cause analysis and resolution, and the Problem Analyst diagnoses the root cause of the problem and proposes and implements solutions for them. This section describes selected Problem Management fields in the out-of-box Service Manager system. Topics in this section include: Problem form after escalation from incident on page 134 Problem Control form details on page 135 Problem Management form after escalation to known error on page 140 Error Control form details on page 141
133
134
Chapter 10
Specifies the status of the problem. This field is not affected by the phase of the problem. The Problem Phase does not automatically change the status except when you first open a problem. All other status changes must be done manually. There are several reasons to change the status of a problem ticket, for example, when you are waiting for a vendors information. These status are available out-of-box: Open The problem has been opened, but it is not currently being worked on. Accepted The Problem Coordinator has accepted this record as his or her responsibility. Work in Progress The problem is being addressed. Pending Vendor The Problem Coordinator contacted the vendor and the vendor has to provide info or send a part. Pending User Problem Coordinator contacted the user and needs more information from him the user. Rejected The Problem Coordinator has rejected responsibility for this record. Deferred Because of several possible constraints, must postpone fixing problem until later release. (This may happen in prioritization and planning, but it can also happen later in the process.)
135
Table 10-1 Problem Management form details (contd) Label Assignment > Assignment Group Description The group assigned to work on the problem. For a description of this field see the Assignment Group field description in (Incident Management form details on page 88) as this field functions similarly. The out-of-box data consists of default assignment groups for use as examples of types of assignment groups. Tip: You may want to change the sample assignment groups to meet your own needs. These assignment groups are available out-of-box: Assignment > Problem Coordinator Application Email / Webmail Field Support Hardware Intranet / Internet Support Network Office Supplies Office Support Operating System Support SAP Support Service Desk Service Manager
This is a required field. The name of the person assigned to coordinate the work on this problem. If the Assignment Group is filled in, the system will populate this field with the pre-defined Problem Coordinator for that group. This person can be changed to any other member of that group using the Fill function. The operator you select should be a member of the assignment group and should have the user role of Problem Coordinator to be assigned Problem Coordinator. Specifies the Service affected by the problem. This field is populated with data from the related incident when a problem is created from an incident. For additional field description information, see User Interaction Management form details on page 44. This is a required field. Affected Items > Primary CI Specifies the name of the failing Configuration Item (CI). The Primary CI identifies the CI that causes the service to go down or be unavailable. The affected CIs in the related incidents and interactions are all of the CIs affected by the service. It is the primary CI that must be fixed to restore the service. For example, if a mail service goes down because of a disk error on the server, the mail server that is the primary CI. Every CI connecting to the mail service (has Outlook installed) is an affected CI. A system-generated count of the number of CIs affected by the outage. The count does not include the Primary CI. Affected CI count is based on the number of items entered in the Assessment notebook tab. It is calculated based on what is in the Assessment notebook tab in the Affected CIs table. A short description summarizing the problem. This field is prepopulated with data from an incident when a user opens a problem from an incident. This is a required field.
Title
136
Chapter 10
Table 10-1 Problem Management form details (contd) Label Description Description A detailed description of the problem. This field is prepopulated with data from the incident when a user creates a problem from an incident. This is a required field. Root Cause Description A detailed description of what caused the problem. You can not move on from the Problem Investigation and Diagnosis phase until you have filled in this description. That phase is not complete until the cause of the problem is known. Problem Detail > Category This field is prepopulated with the value problem. The out-of-box data is the same as in Interaction Management. For additional information, see User Interaction Management form details on page 44 and Interaction categories on page 50. This field is prepopulated with data from an escalated incident. Service Manager displays different lists of areas, depending on the category you selected. For more information on categories, and the areas and subareas associated with them, see Interaction categories on page 50. The out-of-box data is the same as in Interaction Management. For additional information, see User Interaction Management form details on page 44. Problem Detail > Sub-area The third level of classification, mainly used for reporting purposes. This field is prepopulated with data from an escalated incident. Service Manager displays different lists of subareas, depending on the area selected. For more information on categories and the areas and subareas associated with them, see Interaction categories on page 50. The out-of-box data is the same as in Interaction Management. For additional information, see User Interaction Management form details on page 44. Problem Detail > Impact This field is prepopulated with data from an incident. It specifies the impact the problem has on the business. The impact and the urgency are used to calculate the priority. These impacts are available out-of-box: Problem Detail > Urgency 1 - Enterprise 2 - Site/Dept 3 - Multiple Users 4 - User
The out-of-box data is the same as Interaction Management and Incident Management. This field is prepopulated with data from the incident. The urgency indicates how pressing the problem is for the organization. The urgency and the impact are used to calculate the priority. For additional information, see User Interaction Management form details on page 44. The order in which to address this problem in comparison to others. A priority value calculated using initial impact and urgency. This field only appears for problems being updated or escalated from incidents. This is a system-generated field that displays the date and time of when the next SLO will occur. The SLA Target date is the date when the system generates the alerts because the SLA is breached. For additional information see Incident Management form details on page 88.
137
Problem Detail > Priority Problem Detail > SLA Target Date
Table 10-1 Problem Management form details (contd) Label Problem Detail > Root Cause Target Date (Root Cause Identified Date) Description The field specifies the expected date to find the root cause of the problem. The field label (name) changes to Root Cause Identified Date during the Problem Investigation and Diagnosis phase. You should base the date on the target and identified dates on the SLA. Once the root cause is found, this field becomes the identified date. This field become required during the Prioritization and Planning phase to assist prioritization and planning in Problem Management processing. This is a required field. Problem Detail > Solution Target Date (Solution Identification Date) Problem Detail > Resolution Target Date (Problem Resolution Date) The field label (name) changes to Solution Identification Date during the Problem Investigation and Diagnosis phase. The Solution Target date is when you identify the solution. It also becomes required during this phase. This is a required field. The Problem Resolution date should be approximately the same as the SLA Target date. The Problem Resolution date is the date when you plan to click the Close button for the record. It should be before the SLA Target date. It has the Problem Management past due alert attached to it. The field label (name) changes to Problem Resolution Date during the Problem Investigation and Diagnosis phase. This field is required during Prioritization and Planning phase. This is a required field. Problem Detail > Related Incident Count This is a system-generated field. The related incident count is the number of incidents related to problem, as recorded in the screlation table. To relate an incident to a problem, a user clicks Related > Problems > Associated. This is what populates this field with data. Uses a pre-defined closure code to specify the way the problem has been solved. This field is enabled and required during Problem Closure and Review phase. The out-of-box data is the same as that for incidents and interactions. For more information, see User Interaction Management form details on page 44. This is a required field. Problem Detail > Suggested Workaround Assessment > Estimated # of Mandays Assessment > Estimated Costs Assessment > Affected CI's table Describes a temporary solution or workaround. This field needs to be filled before a known error can be created. Specifies a resource estimate to diagnose and resolve the problem. This data does not drive any action and is not required. Provides a resource (cost) estimate to diagnose and resolve the problem. This data does not drive any action and is not required. The affected Configuration Items (CIs) are CIs that will have an issue when the primary CI goes down. These field need to be filled in manually and are for information only. This data does not drive any action and is not required. The data displayed includes the following information: Configuration Item Device Type Assignment Group
138
Chapter 10
Table 10-1 Problem Management form details (contd) Label Task > Task ID Description This notebook tab is only enabled for the Problem Investigation and Diagnosis phase. Tasks can only be opened once the planning is complete. Every task has to be finished before the problem moves to the next phase. Use the Options menu and click Create a task to add a task to this tab. There is a wizard to assist you. The Task ID is system-generated. The Assignee is a person who is part of the assignment group that is defined for the CI. For example, if tasks are assigned to the hardware assignment group, then a person within the group can be assigned to the task This button creates (or opens) the problem ticket after all of the required fields are complete. This button is used to end one phase and proceed to the next phase after all of the required fields are complete This button is used change the problem from the current phase to the previous phase. You should use this button if something went wrong in your process. For example, when you are in the Problem Investigation and Diagnosis phase, and it turns out that you made mistake in the Problem Prioritization and Planning phase, you have to go back to that phase and begin planning again. This button is only available from Problem Investigation and Diagnosis phase or later. The best practice is to create known error at later phases than the Problem Investigation and Diagnosis phase. This button creates or opens a task for the problem. This button is only available from the Problem Investigation and Diagnosis phase or later. This button closes the problem ticket.
Options > Open Known Error button Options > Create Tasks button Close button
139
140
Chapter 10
This is a system-generated field. The out-of-box data is the same status data as that of an incident or interaction except that a known error cannot have a status of inactive. The known error process does not automatically change the status of the record. The status can be set independently of the phase and within one phase the status can be set to any of the statuses available because status and phase are independent of each other in the known error process. These statuses are available out-of-box: Open Accepted Work in Progress Pending Vendor Pending User Rejected Deferred
This is a required field. Assignment > Assignment Group Assignment > Problem Coordinator Affected Items > Services Affected Items > Primary CI Affected Items > Matching CI Count Title The data in this field is inherited from the problem ticket and the field works as described in the Assignment Group field for a problem ticket. See page 136 for additional information. This field is inherited from the problem ticket, and it specifies the person responsible for ensuring that this known error gets resolved. This field can be updated to change the person responsible for the known error. The data in this field is inherited from the problem ticket and the field works as described in the Services field for a problem ticket. See Table 10-1 on page 135 for additional information. The data in this field is inherited from the problem ticket and the field works as described in the Services field for a problem ticket. See Table 10-1 on page 135 for additional information. A system-generated count of the number of related CIs affected by the outage. See Table 10-1 on page 135 for additional information. A brief description of the known error that is inherited from the problem ticket. This is a required field.
141
Table 10-2 Field descriptions for known error forms (contd) Label Description Root Cause Description Description A detailed description of the known error that is inherited from the problem ticket. This is a required field. The root cause description explains what caused the known error (problem) described in the description field. This field is inherited from the Root Cause Description in the problem ticket and is a required field because you cannot continue with the problem process without knowing the root cause of the problem. This is a required field. Known Error Detail > Category Known Error Detail > Area Known Error Detail > Sub-area Known Error Detail > Impact Known Error Detail > Urgency Known Error Detail > Priority Known Error Detail > Solution Identified Date This is a system-generated field and for an out-of-box system the category is problem. The category defines the relevant process, and ensures that the correct process assumes control. This field is inherited from the problem ticket. It provides the same out-of-box data as the interaction record and can be updated. For additional information, see Table 4-1 on page 44. This is a required field. This field is inherited from the problem ticket. It provides the same out-of-box data as the interaction record and can be updated. For additional information, see Table 4-1 on page 44. This is a required field. This field is inherited from the problem ticket. It provides the same out-of-box data as the interaction record and can be updated. For additional information, see Table 4-1 on page 44. This is a required field. This field is inherited from the problem ticket. It provides the same out-of-box data as the interaction record and can be updated. For additional information, see Table 4-1 on page 44. This is a required field. This is a system-generated field. For additional information, see Table 4-1 on page 44. This field is inherited from the problem ticket. Typically, the underlying cause has been identified when the known error is opened. The goal of this process is to identify the solution. This date indicates when the solution was found. For additional information, see Table 4-1 on page 44. This is a required field. Known Error Detail > The user specifies the date and time when the known error is expected to be resolved. It Known Error Resolution Date does not affect any of the other fields. This is a required field. Known Error Detail > Related Interaction Count Known Error Detail > Closure Code This field shows how many interactions were closed directly using the workaround of this known error. Interactions can be closed during the escalation process, allowing association to an known error. The count therefore shows the success rate of the workaround. Specifies a pre-defined closure for describing how the known error has been resolved. This field is enabled and required during the Known Error Resolution phase. The out-of-box data is the same as that for problem, incidents and interactions. For more information, see User Interaction Management form details on page 44. This is a required field. Known Error Detail > Workaround This field describes a workaround that enables users to get round the issue described in the problem ticket.
142
Chapter 10
Table 10-2 Field descriptions for known error forms (contd) Label Known Error Detail > Solution Assessment > Estimated # of Mandays Assessment > Estimated Costs Assessment > Matching Description This field should describe permanent solution for the known error. This field becomes required on completion of the Known Error Investigation phase. Specifies a resource estimate to diagnose and resolve the known error. This data does not drive any action and is not required. Provides a resource (cost) estimate to diagnose and resolve the problem. This data does not drive any action and is not required. The matching Configuration Items (CIs) are CIs that will have an issue when the primary CI goes down. This field is inherited from the problem ticket. These field can be filled in manually and are for information only. This data does not drive any action and is not required. Task Add Next Phase Prior Phase Options > Create Tasks Close Configuration Item List Configuration Item Device Type Assignment Group Task ID Status Assignee Configuration Item
This tab is only available when the record is in the Known Error Investigation phase.
This button creates (or opens) the record after all of the required fields are complete. This button is used to end one phase and proceed to the next phase after all of the required fields are complete This button is used change the known error from the current phase to the previous phase. You should use this button if something went wrong in your process. This button is only available from the Known Error Investigation phase. Tasks can only be opened so that all investigation and planning is complete before solution is accepted. Every task has to be finished before the known error moves to the next phase. This button closes the known error record.
143
144
Chapter 10
The HP Service Manager Change Management application, referred to as Change Management throughout this chapter, supports the Change Management process. It controls the process to request, manage, approve, and control changes that modify your organization infrastructure. This includes assets, such as network environments, facilities, telephony, and resources. Change Management enables you to control changes to baseline service assets and configuration items across the entire service life cycle. This section describes how Change Management implements the best practice guidelines for the Change Management processes. Topics in this section include: Change Management within the ITIL framework on page 146 Change Management application on page 146 Change Management process overview on page 147 Input and output for Change Management on page 157 Key performance indicators for Change Management on page 157 RACI matrix for Change Management on page 159
145
146
Chapter 11
A general overview of the Change Management processes and workflows is depicted in Figure 11-1,below. They are described in detail in Chapter 12, Change Management Workflows.
147
148
Chapter 11
Hardware KM Document Maintenance Network Release Management Software Subscription Unplanned Change
149
150
Chapter 11
KM Document
Maintenance
Network
Release Management
Software
151
Table 11-3 lists the phases for changes that have been flagged as Emergency Changes. Table 11-3 Category CI Group Default Hardware Maintenance Network Software Change Management phases emergency changes Phases and workflow 1. Designing a CI Group > 2. Implementing a CI Group > 3. Accept a CI group 1. Change Logging > 2. Change Review > 3. (At this point the category needs to be changed to one of the others listed in this table) 1. Change Logging > 2. Prepare for Change Approval > 3. Change Approval > 4. Change Implementation > 5. Change Evaluation and Closure 1. Change Logging > 2. Prepare for Change Approval > 3. Change Approval > 4. Change Implementation > 5. Change Evaluation and Closure 1. Change Logging > 2. Prepare for Change Approval > 3. Change Approval > 4. Change Implementation > 5. Change Evaluation and Closure 1. Change Logging > 2. Prepare for Change Approval > 3. Change Approval > 4. Change Implementation > 5. Change Evaluation and Closure
Change Approvals
Each change phase may have one or more approvals. A change request cannot move to the next phase until all approvals associated with the current phase have been achieved. Adding an approval to a change phase allows a member of an approval grou to review the business need behind the change request and approve or p deny it. Typically only system administrators can add approvals to a change phase. Table 11-4 lists the change phases that require approvals out-of-box. Table 11-4 Approvals for out-of-box phases Approvals required Release Build and Test CIGroupImplement Change Approval Discovery Assessment Distribution and Rollout Plan and Design Subscription Approval Verification CIGroupCAB CIGroupAdmin CIGroupTech
Assessment Release Distribution and Rollout Release Plan and Design Subscription Approval Release Verification
152
Chapter 11
Approval definitions
Each approval requires an approval definition record. The approval definition record lists the operator or group who can approve or deny the change, the order in which the system requests approval, and the conditions under which the approvers review is required. For example, the picture below illustrates that the Assessment approval requires approval from three different operators. The COORDINATOR operator must always approve the change, the Service.Desk operators approval is only necessary if the risk assessment has a value of 3, and the Service Manager operators approval is only necessary if the risk assessment has a value of 1.
9xs
Figure 11-3 Sample Approval Definition record Service Manager has four approval types that determine how many approvers are required to advance a change to the next phase. Table 11-5 describes the approval types. Table 11-5 Approval types Description All Groups/Operators defined in the Approval Definition must issue an approval before the change or task can be approved. If only some (but not all) of the Groups/Operators issues an approval, then Service Manager sets the status of the record to pending. For example, suppose you have three Groups/Operators in an Approval Definition and only one Group/Operator has approved the change. Service Manager sets the status to pending. The Approval table shows one currently pending approval, one future approval, and one completed approval action. One must approve Quorum All must approve immediate denial The change or task can be approved with one approval from any Group/Operator of the approving group. This is the default value of all Service Manager approvals. The change or task can be approved as soon as a majority of the approving group indicates approval. All Groups/Operators must approve the record. The first denial causes Service Manager to set the status to Deny. All approvers do not need to register their approval action. Otherwise, the record is denied when all Groups/Operators of the approving group issue a denial.
153
Approval options
Operators with approval rights are enabled to approve, deny, or retract changes and tasks. Table 11-6 explains the approval options. Table 11-6 Approval option Approve Approval options available in Change Management
Description The approver accepts the need for the change or task, and approves commitment of the resources required to fulfill the request. When all approvals are complete, work begins. When you choose this option, the change request shifts to browse mode, and the retract option is available. If you are not a member of a group with approval rights to this change request, Change Management generates an error message. The approver is unwilling to commit the required resources, or does not consider the change or task to be essential. No further approvals are possible until the denial is retracted. An administrative procedure should be set up to handle a denial. If you select deny, a dialog box opens with a prompt to specify the reason for your action. Type an explanation and click OK. The approver accepts the need for the change, but is unwilling to commit the resources or perhaps there are technical incidents at the present time. Retract removes a previous approval or denial and resets the change request to pending approved status, which requires a new approval cycle. If you select retract, a dialog box opens with a prompt to specify the reason for your action. Type an explanation and click OK.
Deny
Retract
Approval delegation
Approval delegation is an optional feature that enables users with approval rights to temporarily delegate their approval authority to another qualified operator. Operators with the can delegate option enabled in their application profiles can delegate some or all of their approvals by using the Approval Delegation wizard. Using the Approval Delegation wizard, an operator can grant another qualified operator the right to temporarily view and act on items in his or her approval queue. The wizard offers the following delegation options: Delegate all approvals to another qualified operator Delegate approvals from a particular application to another qualified operator Delegate approvals directly assigned to you as an operator Delegate approvals assigned to you as a member of an approval group Delegate approvals from a specified start date to a specified end date You can only delegate to individual operators not groups.
154
Chapter 11
The Approval Delegation wizard enables an operator to create any number of approval delegation combinations, including delegating the same approvals to multiple operators at the same time. Delegators can also update an existing approval delegation to change the delegation start and end dates, as well as change the delegate's name. Service Manager prevents delegators from deleting past delegations for compliance reasons such as Sarbanes Oxley (SOX). Service Manager tracks all changes to approval delegations using the standard field auditing capability. When delegates log on to Service Manager, they see both their own and any delegated approvals in their approval list. For security reasons, delegates always retain their original application profiles and operator records. Service Manager determines what temporary rights delegates have when they view or act on an approval.
155
Change Coordinator
Change Manager
156
Chapter 11
Input to Change Management Policy and strategies for change and release Request for change Change proposal Plans (change, transition, release, deployment, test, evaluation, and rendition) Current change schedule and projected service outage (PSO) Current assets or configuration items As-planned configuration baseline Test results, test report, and evaluation report.
% of incidents caused Percentage of incidents caused by the implementation of a change in a given time period. by changes % of emergency changes % of successful changes % of backed out changes % of rejected changes Average time per phase Percentage of the total number of closed changes that were emergency changes in a given time period. Percentage of the total number of closed changes successfully implemented in a given time period. Percentage of the total number of closed changes for which a remediation plan is activated in a given time period. Percentage of the total number of closed changes rejected in a given time period. Average amount of time spent on each of the distinct change phases in a given time period: Change Review, Change Assessment and Planning, Change Approval, Coordinate Change Implementation, and Change Evaluation and Closure.
157
For completeness, the ITIL V3 and COBIT 4.1 KPIs are included below.
158
Chapter 11
Problem Manager
Incident Manager
Change Manager
Release Manager
ST 2.1 ST .2 ST .3 ST .4 ST .5
Change Logging 2Change eview R 2Change ssessment nd Planning A a 2Change pproval A 2Coordinate Change mplementation I
R I
R I I I I C
R I I I I C
R R R I R R C/I
I I I C
I I I C C/I
Change Analyst
Process ID
Activity
160
Chapter 11
Change Management controls the process to request, manage, approve, and control changes that modify your organization infrastructure. This managed infrastructure includes assets, such as network environments, facilities, telephony, and resources. For user requests for products and services, refer to Request Management. Change Management automates the approval process and eliminates the need for memos, email, and phone calls. The Change Management process consists of the following processes, which are included in this chapter: Change Logging (process ST 2.1) on page 161 Change Review (process ST 2.2) on page 164 Change Assessment and Planning (process ST 2.3) on page 167 Change Approval (process ST 2.4) on page 170 Coordinate Change Implementation (process ST 2.5) on page 173 Change Evaluation and Closure (process ST 2.6) on page 177 Emergency Change Handling (process ST 2.7) on page 179
Details for this process can be seen in the following figure and table.
161
162
Chapter 12
Table 12-1 Change Logging process Process ID ST 2.1.1 Procedure or Decision Create new change Assign change to group Provide interaction number and update user
Description This procedure starts when the Service Desk Agent is working on an open-idle interaction in the category Request for Change and escalates it by creating a change request in the tool.
ST 2.1.2
Based on the RFC details (or on the comment listed in the rejection Service Desk Agent reason field) the Service Desk Agent assigns the change to the correct support group. When a change has been created from an interaction on first intake, the user receives an interaction number and is updated with the actions performed by the Service Desk Agent. When the interaction has been created by using self-service, the user is updated with the interaction status and actions. The change is then sent to the Change Review procedure (ST 2.2.1). The Change Coordinator has rejected the change request when reviewing the content. The Service Desk Agent checks the rejection reason and the actions defined. Service Desk Agent
ST 2.1.3
ST 2.1.4
ST 2.1.5
Withdraw change Based on the rejection reason, it may be decided that the change request is not valid anymore and needs to be withdrawn (for example, if it is not feasible to deliver the requested information). If the change is withdrawn, the Change Review and closure process is started (ST 2.6.2). If the change is not withdrawn, go to ST 2.1.6. Information incomplete? Gather required information Create new change Is the change request rejected because it did not contain all necessary information? If yes, continue with ST 2.1.7. If no, go to ST 2.1.2. The Service Desk Agent contacts the change initiator and gathers and records the required information.
The Problem Manager escalates a known error to a change request Problem Manager/ The Release Manager creates a new change request to implement Release Manager/ Change Coordinator a new release The Change Coordinator creates a new change request based on the direct request of an IT specialist from operations or development.
If known, the correct change model can immediately be selected. If unknown, choose the Default Change Change Model. ST 2.1.9 Assign change to group Based on the RFC details (or the comment listed in the rejection reason field) the Problem Manager/Release Manager/Change Coordinator assigns the change to the correct support group. The change is then sent to the Change Review process (ST 2.2.1). The Change Coordinator has rejected the change request when reviewing the content. The Problem Manager/Release Manager/ Change Coordinator checks the rejection reason and the actions defined. Problem Manager Release Manager Change Coordinator Problem Manager Release Manager Change Coordinator
163
Description
ST 2.1.11 Withdraw change Based on the rejection reason, it may be decided that the change request is not valid anymore and needs to be withdrawn (for example, if it is not feasible to deliver the requested information). If the change is withdrawn, the Change Review and closure process is started (ST 2.6.2). If the change is not withdrawn, go to ST 2.1.12. ST 2.1.12 Information incomplete? ST 2.1.13 Gather required information Is the change request rejected because it did not contain all necessary information? If yes, continue with ST 2.1.13 If not, go to ST 2.1.8. The Problem Manager/Release Manager/Change Coordinator gathers and records the required information.
Problem Manager/ Release Manager/ Change Coordinator Problem Manager/ Release Manager/ Change Coordinator
164
Chapter 12
165
Table 12-2 Change Review process Process ID ST 2.2.1 ST 2.2.2 Procedure or Decision Review the change
Description The Change Coordinator selects a change from the new change request queue and starts reviewing the change information.
Information complete The Change Coordinator verifies that the required information in the and assigned to correct change is available and that the change has been assigned to the group? correct support group. If yes, continue with ST 2.2.7. If no, go to ST 2.2.3. Update change Change originated from interaction?
ST 2.2.3 ST 2.2.4
The Change Coordinator updates the change and states the reason that Change the change is returned to the request initiator. Coordinator The Change Coordinator determines if the change request was created Change from an interaction or from a problem ticket. If it was created from an Coordinator interaction record, the rejected change request is sent back to the Service Desk (ST 2.2.5). If it was created from a problem ticket, the rejected change is sent back to the Problem Manager (ST 2.2.6). The Change Coordinator notifies the Service Desk of the reason that the change is returned, including any required actions. The Change Coordinator notifies the Problem Manager/Release Manager/Change Coordinator of the reason that the change is returned, including any required actions. The Change Coordinator verifies if this is a request, which should be handled by using the request fulfillment process, or if it should be verified as a change request that is feasible and necessary. If this request can be handled using the request fulfillment process, continue with ST 2.2.8. If not, go ST 2.2.9. The Change Coordinator rejects the change and updates the record with a rejection reason. The change is then sent to the Change Evaluation and Closure process (ST 2.6.2). The Change Coordinator verifies that the change is logical, feasible, and necessary, and makes sure that it does not contradict company standards and policies and that it has not previously been initiated and rejected. Change Coordinator Change Coordinator
ST 2.2.5 ST 2.2.6
Notify Service Desk Notify Problem Manager/Release Manager/Change Coordinator Standard change?
ST 2.2.7
Change Coordinator
ST 2.2.8
Reject change
ST 2.2.9
ST 2.2.10 ST 2.2.11
Verification approved? If the change passes the validity criteria, continue with ST 2.2.12. If not, go to ST 2.2.11. Reject change The Change Coordinator rejects the change and updates the record with a rejection reason. The change is then sent to the Change Evaluation and Closure process (ST 2.6.2).
ST 2.2.12 ST 2.2.13
Select change category The change request has initially been created from a default category. Change The Change Coordinator now selects the appropriate change category. Coordinator Provide change details The change is completed with other information that was not automatically provided from the change category. Change Coordinator
166
Chapter 12
Based on the answers to these questions, the change is categorized, prioritized, and planned, and then a remediation plan is developed. The Change Review process is performed by the Change Coordinator.
167
168
Procedure or Decision Description Assess change impact and determine risk category When conducting the impact and resource assessment for changes, the Change Coordinator considers the following relevant items: Impact that the change will make on the customers business operation Effect on the infrastructure and customer service Impact on other services that run on the same infrastructure (or on projects) Impact on non-IT infrastructures within the organization Effect of not implementing the change The IT, business, and other resources required to implement the change including the likely costs, the number and availability of people required, the elapsed time, and any new infrastructure elements required The current change schedule (CS) and projected service outage (PSO) Additional ongoing resources required if the change is implemented Impact on the continuity plan, capacity plan, security plan, regression test scripts, data and test environment, and Service Operations practices.
If needed, the Change Coordinator can include business owners and technical analysts' requirements and probability of risk. The appropriate risk level can then be calculated or measured and included in the process and decision of making the change. Based on the impact and the probability of the change to occur, the risk category is determined. ST 2.3.2 Evaluate change The Change Coordinator contacts the Change Analysts (for example, IT specialists, security officer, System Administrator) after the change assessment. The Change Analysts evaluate the information and indicate whether they support approval of the change. Based on the change evaluation, the Change Coordinator determines whether the change is supported for approval or not. If no, continue with ST 2.3.4. If yes, continue with ST 2.3.6. Has the change not been approved because the impact and risk categorization is not satisfactory? If yes, go back to ST 2.3.1. If no, continue with ST 2.3.5. The Change Coordinator rejects the change and updates the change with a rejection reason. The change is then sent for the Change Evaluation and Closure process (ST 2.6.2). The Change Coordinator considers the impact and urgency of a change to set the priority. The priority establishes the order in which changes are processed. Change Coordinator
ST 2.3.3
Change Approval supported? Impact and risk categorization unsatisfactory? Reject change
ST 2.3.4
ST 2.3.5
ST 2.3.6
Allocate priority
169
Table 12-3 Change Assessment and Planning process (contd) Process ID ST 2.3.7
Procedure or Decision Description Functional change to service? Does this change concern a functional change of the service? If yes, Release and Deployment Management is needed for the clustering, approval, build, and test. Go to the Release and Deployment management process (ST4). If no, continue with ST 2.3.8.
ST 2.3.8
The Change Coordinator carefully plans and schedules the change. A Change detailed change plan is created, which indicates the activities that will Coordinator need to be performed to implement the change. The change plan can be visualized in change tasks. If a very detailed plan is created, it might be more appropriate to attach the plan to the change as an attachment. The Planned Change Start and End Date need to be filled in to publish the change on the change calendar. Before scheduling the change, the change calendar should be checked to verify that there are no conflicting changes in the scheduled period. If possible, the change should be scheduled in the maintenance window for the impacted service(s), as agreed in the SLA.
ST 2.3.9
The Change Coordinator develops a remediation plan that contains an Change alternate remediation scenario that describes how to undo the change. Coordinator
170
Chapter 12
171
Table 12-4 Change Approval process Process ID ST 2.4.1 Procedure or Decision Review change
Description
Role
The Change Manager verifies that the change is logical, feasible, and Change necessary. The Change Manager also makes sure that the change does Manager not conflict with company standards and policies, and checks to see if the proposed change has been proposed and rejected in the past. This verification step is typically also performed by the Change Coordinator at an earlier step in the process. However, for segregation of duties reasons, be sure that changes are validated again by the Change Manager. If yes, go to ST 2.4.4. If no, go to ST 2.4.3. Change Manager
Change valid? Reject change Impact and risk analysis satisfactory? Update change
If the change is invalid, the change is rejected by the Change Manager Change and is input for the Change Evaluation and Closure process. Manager If yes (that is, assessment of change impact and analysis and determination of risk category is satisfactory), go to ST 2.4.6. If no, go to ST 2.4.5. Update the change with the remarks about the impact and risk analysis, and then request that the Change Coordinator update the change. If yes, go to ST 2.4.8. If no, go to ST 2.4.7. Change Manager Change Manager Change Manager Change Manager Change Manager
ST 2.4.5
ST 2.4.6
ST 2.4.7
Update the change with the remarks about the planning and scheduling, and then request that the Change Coordinator update the change. The Change Manager determines the level of authorization based on the type, size, or risk of the change. The Change Manager then selects the approvers required for each change. At minimum, the Group Manager of the affected Service and the CI Group Manager of the affected CI(s) should approve the change. The Change Manager determines whether a CAB meeting should be scheduled to discuss the change approval, or if instead the change can be authorized via email or the Change Management registration system. The Change Approver selects the change that he or she must approve, checks the change content, and then either approves or denies the change. If the Change Approver has questions to ask prior to granting approval, the Change Approver directs questions to the Change Coordinator. If the change is denied, the Change Approver must fill in a denial reason.
ST 2.4.8
ST 2.4.9
Change Manager
ST 2.4.10
Authorize change
Change Approver
ST 2.4.11
When all approvers have authorized the change, the Change Manager Change verifies that the change has been appr ved by all. If yes, continue with Manager o ST 2.4.12. If no, go to ST 2.4.13.
172
Chapter 12
Table 12-4 Change Approval process (contd) Process ID ST 2.4.12 Procedure or Decision Update change
Description The Change Manager updates the change with the approval information and passes the change to the Change Coordinator for implementation. Review the reasons that a Change Approver has denied authorization for the change. If yes, go to ST 2.4.4. If no, go to ST 2.4.15.
ST 2.4.13 ST 2.4.14
Review denial reason Denial because of an impact, risk, planning, or scheduling issue? Reject change
ST 2.4.15
The Change Manager rejects the change based on approval results. The Change Manager fills in a rejection reason and the change is sent to the Change Evaluation and Closure process.
173
174
Table 12-5 Coordinate Change Implementation process Process ID ST 2.5.1 ST 2.5.2 Procedure or Decision Schedule implementation Definitive Media Library change needed?
Description The Change Coordinator schedules managing the change, according to the plan created previously. Does this particular change require a change in the Definitive Media Library (for example, changes related to software development or a new type of hardware)? If no, continue with ST 2.5.3. If yes, continue to the Definitive Media Library to make the change, and then forward the change to the release and deployment process where the following activities will be executed: Plan the release Update the Definitive Media Library Communicate with stakeholders Build release Test release Document release
After release and deployment management has finished the release package, the change is returned to the Change Management process. ST 2.5.3 Create and monitor tasks for build, test, and implementation The Change Coordinator creates the change tasks for building, testing, and implementing the change. All tasks are scheduled and assigned to the scheduled Change Analyst. Then the Change Coordinator monitors the progress of the change tasks and the change. The Change Analyst verifies that the change task has been correctly assigned and that the information is complete to execute the change task. If the assignment is incorrect or information incomplete, go to ST 2.5.6. If not, go to ST 2.5.7. The change task is rejected and returned to the Change Coordinator. The Change Analyst builds or configures the change, as scheduled. It is important that all changes in the infrastructure are well documented. When finished building the change, the Change Analyst sends the change for testing. All hardware changes, software changes, and new releases must be tested before implementing them in production. Test plans must be available to support the test activities, and the test results must be documented. The Change Coordinator verifies that the change has passed the test criteria. If yes, the change is authorized to be implemented in the production environment, go to ST 2.5.10. If not, go to ST 2.5.7. Change Coordinator
ST 2.5.4
Validate task
ST 2.5.5
Assignment incorrect or information incomplete? Reject task Build and document change
ST 2.5.6 ST 2.5.7
ST 2.5.8
Change Analyst
ST 2.5.9
Passed test?
Change Coordinator
175
Table 12-5 Coordinate Change Implementation process (contd) Process ID ST 2.5.10 ST 2.5.11 Procedure or Decision Implement change Perform production test Implementation successful?
Description The Change Analyst implements the change in the production environment, according to the change implementation schedule. Immediately after implementing the change in the production environment, perform verification tests to determine if the change implementation was successful. The Change Coordinator verifies whether or not the change has been successfully implemented in the production environment. If the change has not been successfully implemented in the production environment, go to step 2.5.13 to activate the remediation plan. An example of an unsuccessful change implementation is if a change causes a severe disruption of the changed service or services. If the change is successfully implemented in the production environment, the change is passed to the Change Evaluation and Closure process ST 2.6.1. The change is also passed to the Configuration Management Planning process ST 3.1.3 to update the Configuration Management System (CMS). A change cannot be closed until all changes on the involved CIs have been registered in the Configuration Management System (CMS).
ST 2.5.12
ST 2.5.13
After or during the change implementation failure, the Change Change Coordinator activates the remediation plan to return the system to the Coordinator prechange state. The Change Analyst is the expert who executes the fallback scenario and rolls back the change. Change Analyst
ST 2.5.14
176
Chapter 12
The Change Review process is performed by the Change Coordinator and the Change Manager. Details for this process can be seen in the following figure and table.
177
Table 12-6 Change Evaluation and Closure process Process ID ST 2.6.1 Procedure or Decision Evaluate change handling
Description After implementation of the change, the Change Coordinator verifies that the change was handled correctly and that the administration of the change is complete. The Change Coordinator also reviews change handling to verify that all related tickets are still correct. The Change Coordinator updates the change request and closes the change. The change request is now closed and all change initiators receive a notification that the related change is successfully implemented. The Change Coordinator generates an overview of all changes that have been closed since the last review. The Change Manager then narrows the overview to a list of changes that require reviewing. Change Manager must review certain changes after a predefined period. This process involves CAB members and is part of the CAB agenda. The purpose of the review is to establish the following: Change has had the desired effect and met its objectives. Users, customers, and other stakeholders are satisfied with the results, and any shortcomings are identified. There are no unanticipated or undesirable side effects to functionality, service levels, or warranties (for example, availability, capacity, security, performance, and costs). Resources used to implement the change were as planned. Release and deployment plan worked correctly (recorded information includes comments from the implementers). Change was implemented on time and to cost. Remediation plan functioned correctly, if required.
ST 2.6.2
Close change
Change Coordinator
ST 2.6.3
Generate periodic overview of closed changes Determine which changes to review Post Implementation Review (PIR)
ST 2.6.4 ST 2.6.5
ST 2.6.6
Determine and execute Based on the outcome of the Post Implementation Review, the Change Change follow-up action Manager defines an action list and starts the execution of defined Manager actions.
178
Chapter 12
If the E-CAB decides that an emergency change can be handled as a normal change, the emergency change is recategorized and implemented by using the normal change process. The following user roles are involved in Emergency Change Handling: Change Manager Change Analyst E-CAB Release Packaging and Build Manager
Details for this process can be seen in the following figure and table.
179
180
Table 12-7 Emergency Change Handling process Process ID ST 2.7.1 Procedure or Decision Discuss and determine change requirements
Description The Change Manager discusses the requirements for the emergency change in cooperation with the Incident Manager.
ST 2.7.2
Determine change The change impact and risk category is determined the same way impact and risk as a normal change request, except that it is designated as high category priority. Organize emergency CAB meeting Authorize change Approved by E-CAB? Additional requirements set by E-CAB? Reject change Handle as emergency change? Recategorize and update change The Change Manager calls the Emergency CAB (E-CAB) to authorize the change. The E-CAB consists of members authorized to make decisions about high impact emergency changes. The E-CAB members authorize the change. Has the emergency change been approved by the E-CAB members? If yes, continue with ST 2.7.8. If no, go to ST 2.7.6. The Change Manager notes whether E-CAB denies a proposed emergency change due to extra requirements for the Change Management process. If there are extra requirements, go to ST 2.7.1. If no, go to ST 2.7.7. The Change Manager rejects the emergency change and sends it back to the Incident Manager. Has the E-CAB decided to handle this change as an emergency change? If yes, go to ST 2.7.10. If no, go to ST 2.7.9.
Change Manager
ST 2.7.3
Change Manager
ST 2.7.7 ST 2.7.8
ST 2.7.9
The Change Manager recategorizes the change as a normal change Change Manager and updates the change with all relevant information. Because the change has already been approved by the E-CAB, the Coordinate Change Implementation phase can begin. The assigned Change Coordinator is notified. Does this emergency change require a change in the Definitive Media Library (DML)? If yes, go to ST 2.7.12. If no, continue with step ST 2.7.11. Change Manager
ST 2.7.10
ST 2.7.11 ST 2.7.12
Implement change The Change Analyst implements the change in the production environment with the highest priority. Build release in development environment
Change Analyst
The Change Analyst builds a new release with the highest priority. Change Analyst When the Change Analyst is finished, the new release is sent to the Release Packaging and Build Manager.
ST 2.7.13
Transfer release to The Release Packaging and Build Manager transfer the new Release Packaging test environment release to the test environment and update the (CMS) or the and Definitive Media Library. For compliance reasons, this role should Build Manager not be performed by the Change Analyst who performs the build. Test release The Change Analyst tests the new release within the set time frame. Change Analyst
ST 2.7.14
181
Table 12-7 Emergency Change Handling process (contd) Process ID ST 2.7.15 Procedure or Decision Test successful?
Description The Change Analyst accepts the new release and determines if it can be released for transfer to the production environment. If yes, go to ST 2.7.16. The Change Analyst notifies the Release Packaging Manager and Build Manager to transfer the release to the production environment. If no, go back to ST 2.7.12.
ST 2.7.16
Transfer release to The Release Packaging and Build Manager transfers the new production release to the production environment and updates the status of the environment new release in the Definitive Media Library. Perform test After implementing the emergency change in production, the Change Analyst performs a quick test to verify that the error has been resolved and has not triggered any other errors. The Change Analyst determines if the change was successful or not. If yes, continue with ST 2.7.21. If no, go to ST 2.7.19 to start the rollback process. The Change Manager decides to start the rollback procedure.The Change Analyst follows the rollback plan to restore the production environment to its prechange state. The Change Manager informs the Incident Manager about the unsuccessful change implementation and returns the emergency change to the Incident Escalation process.
ST 2.7.17
ST 2.7.18
Change Analyst
ST 2.7.19
Change Analyst
ST 2.7.20
Inform Incident Manager Inform Incident Manager and Change Manager, and then close the incident ticket
Change Manager
ST 2.7.21
The Change Analyst informs the In cident Manager and the Change Change Analyst Manager about the successfully implemented emergency change. If the Incident Manager agrees, the related incident ticket is closed.
ST 2.7.22
Handle The Change Manager updates the emergency change request with emergency change all relevant information and closes the change phases where request appropriate and assigns the change tasks to update the Definitive Media Library/CMS or to have the change activities registered. Then the emergency change is passed to the Change Evaluation and Closure process. Typically this comes after the change implementation.
Change Manager
182
Chapter 12
HP Service Manager uses the Change Management application to enable the Change Management process. The main function of Change Management is to standardize the methods and processes a business organization uses to plan and implement changes. Change Management records all changes to service assets and configuration items in the Configuration Management System (CMS). In Change Management, the Change Manager sends the change requests to the correct approvers and coordinates Emergency Change Handling, the Change Approver and approves or denys the change request, the Change Coordinator plans the implementation of the change and verifies that the change has been completed satisfactorily, and the Change Analyst implements the change. This section describes selected Change Management fields in the out-of-box Service Manager system. Topics in this section include: Change Management form after escalation from a known error on page 184 Change Management form details on page 185
183
Figure 13-1 Change Management form after escalation from a known error
184
Chapter 13
This is a system-generated field that defines the global approval status for the change, not for a single approval. The system sets this field depending on current approvals and the approval type defined for the module. These approval statuses are available out-of-box: Pending Approved Denied
The name of the user requesting the change. This is a required field. This is a system-generated field that the system populates based on the contents of the Initiated by field. This is a system-generated field that the system populates based on the contents of the Initiated by field. This is a system-generated field that the system populates based on the contents of the Initiated by field.
185
Table 13-1 Change Management field descriptions (contd) Label Assignment Assignment Group Description The group assigned to work on the change. For a description of this field see the Assignment Group field description in (Incident Management form details on page 88) as this field functions similarly. The out-of-box data consists of default assignment groups for use as examples of types of assignment groups. Tip: You may want to change the sample assignment groups to meet your own needs. These assignment groups are available out-of-box: Assignment Change Coordinator Application Email / Webmail Field Support Hardware Intranet / Internet Support Network Office Supplies Office Support Operating System Support SAP Support Service Desk Service Manager
This is a required field. The name of the person responsible for coordinating the implementation of the change. Each Change Coordinator may belong to several assignment groups. Each group can have just one Change Coordinator. This is a required field. Affected CI Service Affected CI Affected CI Location Title Description Change Detail > Category Specifies the service affected by the change. This is a system-generated field and is prepopulated when a change request is created from an interaction. This is a required field. The list of Configuration Items (CIs) affected by the change. The system pre-populates this field when a change request is created from an incident or known error. Users can add additional CIs. Specifies the location for the change. The system pre-populates this field the change is created by escalating an interaction. Provides a short description of the change. This is a required field. Provides a more detailed description of the change. This is a required field. This is a system-generated field that classifies the type of change. The Default and Unplanned Change categories are used for changes opened in the background; they are available to Change Managers and System Administrators, but not to regular users. The out-of-box categories are described in Change Management categories on page 149.
186
Chapter 13
Table 13-1 Change Management field descriptions (contd) Label Change Detail > Emergency Change Description When checked, the system handles the change according to the emergency change process. The system adds the ECAB approval group requirement and this allows the change to skip some approvals and phases to make the change happen sooner. An emergency change skips the Change Review and Change Assessment and Planning phases after the phase Change Logging closes. Emergency changes go directly to the phase Prepare for Change Approval. The system also adds the Emergency Group Approval to the Change Approval phase and creates an activity record that shows This change is logged as an Emergency Change in the Activities > Historic Activities tab. If a change later becomes an emergency, the activity records notes that This change has become an Emergency Change. There are also notifications to the Change Manager every time there is an activity (open, update or closure of an emergency change) Note: An Emergency Change is not the same as an Unplanned Change. Change Detail > Release Management Change Detail > Impact When checked, the system manages this change with the Release Management module. This field is prepopulated with data from an incident when a change is created from and incident. It specifies the impact the problem has on the business. The impact and the urgency are used to calculate the priority. These impacts are available out-of-box: 1 - Enterprise 2 - Site/Dept 3 - Multiple Users 4 - User
The out-of-box data is the same as Interaction Management, Problem Management, and Incident Management. This is a required field. Change Detail > Urgency The urgency indicates how pressing the change is for the organization. The urgency and the impact are used to calculate the priority. This field functions similarly to the same field for interaction, incident, and problem tickets. For additional information, see User Interaction Management form details on page 44. This is a required field. Change Detail > Priority This is a system-generated field using the urgency and impact of the change. This field functions similarly to the same field for interaction, incident, and problem tickets. For additional information, see User Interaction Management form details on page 44.
187
Table 13-1 Change Management field descriptions (contd) Label Change Detail > Risk Assessment Description Specifies a code that indicates the risk incurred with the implementation of the change. This field becomes required in the Change Assessment and Planning phase. These risk assessments are available out-of-box: 0 - No Risk 1 - Low Risk 2 - Some Risk 3 - Moderate Risk 4 - High Risk 5 - Very High Risk
After a user selects this field, the change may require additional approvals based on the risk. The approval is based on the risk number in the assessment approval record Change Detail > Requested End Date Change Detail > Alert Stage The system pre-populates this field if the change request is created from an interaction escalation. This is the date the change initiator requests the implementation of the change. This is a required field if not prepopulated. This is a system-generated field that lists the current Alert Stage of this request. Change Management updates this field automatically when processing alerts against this change. Do not update it manually. The alerts are processed against a change by using the Phase definition. This field is not active in an out-of-box system and must be manually enabled. This field specifies the date and time that the work to implement the change should start. This field becomes required in the Change Assessment and Planning phase. This field specifies the date and time that thework to implement the change should end. This field becomes required in the Change Assessment and Planning phase. The date and time when the change is scheduled to begin. Scheduled downtime only needs to be filled when the service is down, while implementing the change. The date and time when the change is scheduled to end. Scheduled downtime only needs to be filled when the service is down, while implementing the change. If selected (set to true), indicates that the Configuration Items (CIs) are currently not operational and the downtime is scheduled. The fields Scheduled Downtime Start and Scheduled Downtime End are used along with the field Configuration Item(s) Down to indicate the scheduled time to bring the CI down. These fields are never required and should only be populated if you plan to bring down the CIs as part of the change. The interval selected applies to all the CIs of the change and cannot be specified by individual CI. When the change is closed, you may get the form confirming the outage times, and when you actually close the change, the CIs will be set as Up in Configuration Management. This field references an external project number. This field provides the same data as the Affected CI field. Displays the field name for the affected CI. The data in this section is used by the UCMDB integration whenever there are past changes to the values registered for the CI.
Change Detail > Planned Start Change Detail > Planned End Change Detail > Scheduled Downtime Start Change Detail > Scheduled Downtime End Change Detail > Configuration Item(s) Down
Ex. Project Ref. Associated CI > Associated CI Associated CI > Field name Associated CI > Completed/Cancelled CMDB Modifications
188
Chapter 13
Table 13-1 Change Management field descriptions (contd) Label Affected Services > Affected Services Approvals > Current Approvals > Description This notebook tab provides a list of affected services. When a configuration item for an incident is added or updated, a schedule record is created that runs a routine to update the list of affected services. This notebook tab provides an overview of the current approvals related to any changes for the CI as well as important in formation such as approval status, approvers This includes a list of groups or operators who must acknowledge or accept the risk, cost, and so on associated with the implementation of a Change request or task. Approvals give controlling authorities the ability to stop work and to control when certain work activities can proceed. The data displayed includes the following information: Approvals > Approval Log > Approval Type Approval Status # Approved # Denied # Pending
This notebook tab provides an overview of past approvals related to the changes for the CI as well as important information such as approval status and approvers. The data displayed includes the following information: Action Approver/Operator By Date/Time Phase
Approvals > Pending Reviews > Reviewers Plan > Plan Task >
The name(s) of the groups or operator IDs that should review the change for the CI after it has been approved. This tab provides space to give an assessment of the change, often generated by the Change Analyst, that the Change Coordinator uses to assess the impact of the change to services. Whenever a change is in a phase where the user can generate tasks, Service Manager allows user a quick view of some of the most important fields in the task from the Task tab. The data displayed includes the following information: Task No Status Approval Status Assigned To Description Category
Backout Method
Provides a detailed method for backing out the change if there is a problem implementing the change. This is a required entry for an changes in the Unplanned Change category. It is also required in the Discovery Back Out phase and for the Release Management category in order to close the Release plan and design phase.
189
190
Chapter 13
The HP Service Manager Configuration Management application, referred to as Configuration Management throughout this chapter, supports the Configuration Management process. It enables you to define and control the components of services and infrastructure, and to maintain accurate configuration information about the historical, planned, and current state of services and infrastructure. Configuration Management ensures that you identify, baseline, and maintain selected components of a complete IT service, system, or product as Configuration Items and that you control changes to them by requiring formal approvals. Configuration Management also ensures that you control releases into your business environments. This section describes how Configuration Management implements the best practice guidelines for the Configuration Management processes. Topics in this section include: Configuration Management application on page 192 Configuration Management within the ITIL framework on page 192 Configuration Management process overview on page 196 Input and output for Configuration Management on page 199 Key performance indicators for Configuration Management on page 200 RACI matrix for Configuration Management on page 201
191
192
Chapter 14
All CIs are defined in the device file, the foundation of Configuration Management. Each CI record can include contact, location, vendor, and outage history. Other Service Manager applications, such as Incident Management and Change Management, access Configuration Management to populate fields on forms through the use of link records. Configuration Management enables you to do the following: Identify, control, record, report, audit, and verify service assets and CIs, including versions, baselines, constituent components, and their attributes and relationships. Account for, manage, and protect the integrity of service assets and CIs throughout the service lifecycle by ensuring that only authorized components are used and only authorized changes are made.
As new and updated services and systems are released and distributed, accurate configuration information must be available to support the planning and control of changes. Service Managers out-of-box Configuration Management workflow tracks the IT assets and configurations that make up the infrastructure. These assets can be hardware, software, and associated documentation. The inter-relationships between these components are also monitored. Effective results integrate the service provider's configuration information processes and those of its customers and suppliers. All major assets and configurations must be accounted for and have a responsible manager who ensures that protection and control is maintained. User profiles determine the access level within Configuration Management. Depending on your access level, you can do the following: Add, edit, and save CI records. Manage CIs using predefined views to find CIs quickly. View and modify software installation information. View the maintenance schedule for a CI. View and modify SLA information. Add CIs to a contract and manage existing contracts.
193
The integration offers several different ways for users to view CI actual state information: By default, the integration automatically updates the managed fields of Service Manager CI records as part of the regular UCMDB synchronization schedule. You can choose the option to configure the integration to automatically create change or incident tickets instead. You can view the current actual state of a CI by looking at the Actual State tab in the Service Manager CI record. For more information see Baselines on page 194, Managed state on page 195 and Actual state on page 195. You can use the Service Manager View in UCMDB option to log in to the UCMDB system and view the current CI attributes from UCMDB. A Service Manager user must have a valid UCMDB user name and password to log in to the UCMDB system.
You can specify CI relationships directly in Service Manager or define them in UCMDB and push them to Service Manager like any other asset, by using web services. You can also create UCMDB CI relationships from Service Manager CIs.
Baselines
Baselines are an optional feature of Configuration Management that allow you to define a set of attributes that all instances of a configuration item (CI) should have. A baseline is a template CI that defines the expected or authorized attributes of a CI. Typically, a baseline only describes the attributes that you expect CIs to share in common and does not include attributes that you expect to vary. For example, a baseline describing PCs might require that all PC CIs be assigned the same model number and operating system version but not the same owner or serial number. In this example, the model number and the operating system would be authorized attributes of the baseline, while the owner and the serial number would be individually-managed attributes. Baseline records replace baseline configuration item groups from previous versions of Service Manager. The upgrade process converts existing baseline configuration item groups to query groups. Baseline records are separate from the CI records they manage. You must first create a baseline record before you can associate it with one or more CIs. All baseline records must have a name, a list of authorized attributes, and a state. Baseline records can optionally have a version number, which administrators can configure from the Configuration Management environment record. A baseline records status determines whether you can add or edit attributes, and whether you can associate CIs to the baseline. After you authorize a baseline record, its attributes are locked and you can only associate or remove CIs from the baseline. It is up to a Configuration Management manager to determine whether a CI that is out of compliance with its baseline is acceptable or requires a change. Keep in mind that both the CI record and the baseline record describe the expected or managed state of a CI. A baseline record is intended to describe the expected state across many similar items. A CI record describes the expected state of an individual item. There may be cases where it is acceptable for an individual CI to have a different managed state than other CIs in the same baseline. For example, you might have a baseline requiring that all application servers have 8 GB of RAM. However, you may also want one of your application servers, the Web server, to have 16 GB of RAM. You may want to authorize this exception to the baseline rather than creating a new baseline record to describe just one CI. Baselines only check for compliance against the managed state of the CI. The actual state of the CI is irrelevant to a baseline compliance check. Continuing the example above, the Web server CI record might list 16 GB of RAM as the managed state. This makes it out of compliance with the baseline that requires all application servers to have 8 GB of RAM. If a discovery process later reveals that the Web server actually only has 12 GB of RAM, this might cause Service Manager to open an unplanned change, but it will not cause a new violation of the baseline. Only differences between the CIs managed state (16 GB of RAM) and the baseline (8 GB of RAM) matter.
194
Chapter 14
Managed state
In Service Manager, the managed state is the subset of CI attributes that have been defined as critical enough to be closely managed by a formal change process and have been approved by that process. You may add managed state information for a CI in several ways: Automatically add CI attributes from an integration to HP Universal CMDB Automatically add CI attributes from an integration to Connect-It and HP Universal CMDB Manually add CI attributes
After you add the managed state information to a CI, any changes to the CI attributes must go through a Change Management process. Service Manager owns the managed state of a CI and acts as the definitive source of what the CI attributes should be. The actual state of the CI may differ from the managed state and may trigger actions in Service Manager such as an out of compliance with baseline warning message or the opening of an unplanned change.
Actual state
The actual state of a CI is the current list of CI attributes. By default, Service Manager only stores and displays the expected or managed state of CIs. Service Manager can only receive actual state information if you set up an integration to HP Universal CMDB. Service Manager uses the actual state to determine if a CI is in compliance with its managed state. Service Manager compares the managed attribute values listed in the CI record to the attributes values listed in HP Universal CMDB. If any of the managed attribute values differ from the managed state, Service Manager takes action as defined in the Discovery Event Manager (DEM) settings. By default, Service Manager opens an unplanned change whenever the actual state of a CI attribute differs from the managed state.
195
To view the actual state of the CI, you must first create an integration to a HP Universal CMDB server. The HP Universal CMDB server periodically discovers the actual state of CIs and records the actual state in the Configuration Management database. Service Manager accesses the actual state information by using a Web services connection. Service Manager sends the CI ID to the HP Universal CMDB server and receives a full list of the attributes for that CI. Service Manager displays the CI attributes on the Actual State notebook tab of the Configuration Management form. If a Service Manager CI does not have a matching CI in the HP Universal CMDB server, then Service Manager does not display the Actual State notebook tab. For example, you may track office furnishing CIs in Service Manager that cannot be discovered and tracked in the HP Universal CMDB.
CI relationships
Service Manager tracks upstream and downstream relationships between CIs. A relationship between CIs means that there is some dependency between CIs. If an upstream CI has an interruption of service, Service Manager assumes that all CIs with a downstream relationship to the affected CI also have an interruption of service. For example, if a network router has an interruption of service, then all servers and PCs that connect to that router also have an interruption of service. Any given CI typically has one upstream relationship and one or more downstream relationships. CIs can have logical or physical relationships based on the logical name of the configuration item. CI relationships are independent of baseline, actual or managed states.
196
Chapter 14
The asset management portion of this process manages service assets across the whole service life cycle, from acquisition to disposal. It also provides a complete inventory of assets and the associated owners responsible for their control. The Configuration Management portion of this process maintains information about any CI required to deliver an IT service, including its relationships. This information is managed throughout the life cycle of the CI. The objective of Configuration Management is to define and control the components of an IT service and its infrastructure, and to maintain accurate configuration information. The Configuration Management process manages service assets to support other Service Management processes. Effective Configuration Management facilitates greater system availability, minimizes production issues, and resolves issues more efficiently. The Configuration Management process ensures that selected components of a complete IT service, system, or product (the Configuration Item) are identified, baselined, and maintained and that changes to them are controlled. It also ensures that releases into controlled environments and operational use are completed on the basis of formal approvals. Configuration Management comprises five basic activities. The Configuration Management process encompasses all of these activities and ensures that assets are tracked and monitored effectively. The basic activities within the scope of Configuration Management are: Configuration Management Planning (process ST 3.1) on page 203 includes the activities that enable you to plan the function, scope, and objectives of Configuration Management for your organization. Configuration Identification (process ST 3.2) on page 206 includes the activities that enable you to identify and label all of your companys existing IT components. The information you track includes asset identification, contact, asset network relationship, and model or version data. Enter this information into the database. Inventory maintenance Configuration Control (process ST 3.3) on page 209 includes the activities that enable you to ensure that all information regarding your IT components is kept up to date and accurate. Components can be added, modified, or removed only through controlling documentation, such as an approved Request for Change (RFC). Master data management (process ST 3.6) on page 219 includes the activities that enable you to reconcile master reference data managed in other administrations. Configuration Status Accounting and Reporting (process ST 3.4) on page 212 includes the activities that enable you to run reports of the current and historical data that is concerned with each IT component throughout its life cycle. Status accounting makes changes to components trackable. Configuration Verification and Audit (process ST 3.5) on page 215 includes the activities that enable you to check and verify physical existence of IT components and ensure that they are correctly recorded in the database.
A general overview of the Configuration Management processes and workflows is depicted in Figure 14-1, below. They are described in detail in Chapter 15, Configuration Management Workflows.
197
198
Chapter 14
CMS/Tools Configures the data model, policies, and CI types in Service Manager. Administrator
199
% of CIs Number of CIs related to one or more other CIs as a percentage of the total number of related to other registered CIs that can be related to other CIs, in a given time period. CIs % of inaccurate CIs Number of CIs in the CMS that are registered with inaccurate information as a percentage of the total number of registered CIs, in a given time period.
For completeness, the ITIL V3 and COBIT 4.1 KPIs are included below.
200
Chapter 14
Process ID
Configuration Management Planning Configuration Identification Configuration Control Configuration Status Accounting and Reporting Configuration Verification and Audit Manage Master Data
Activity
R R R R R R
202
Chapter 14
The Configuration Management process manages service assets to support other Service Management processes. Effective Configuration Management facilitates greater system availability, minimizes production issues, and resolves issues more efficiently. The Configuration Management process consists of the following processes, which are included in this chapter: Configuration Management Planning (process ST 3.1) on page 203 Configuration Identification (process ST 3.2) on page 206 Configuration Control (process ST 3.3) on page 209 Configuration Status Accounting and Reporting (process ST 3.4) on page 212 Configuration Verification and Audit (process ST 3.5) on page 215 Master data management (process ST 3.6) on page 219
Details for this process can be seen in the following figure and table.
203
204
Table 15-1 Configuration Management Planning process Process ID ST 3.1.1 Procedure or Decision Maintain Configuration Management plan
Description The Configuration Manager maintains the Configuration Management policies, objectives, scope, and principles. Periodically, this plan is reviewed to determine improvements. The Configuration Management plan (ACM plan) also defines the scope and level of detail of Configuration Item (CI) data to be maintained in the CMS. A Configuration Management plan provides the guidelines for documenting and modeling IT services in the CMS (identification of CIs). Determine whether the Configuration model should be updated. If yes, go to ST 3.1.4. If no, go to ST 3.1.9. The Configuration Manager receives a task from Configuration Management to update the CMS data model (for example, when a new type of CI is introduced in the IT infrastructure as a result of a release). The data model defines the structure and information model of the CMS. This includes: Model of IT services (breakdown of services into service components) CI relationships types Definition of CI types Definition of CI attributes Identification of data sources (such as HR-system or ERP)
ST 3.1.2
ST 3.1.3
ST 3.1.4
CMS/Tools Administrator
The Configuration Manager determines the type of modification that is required for the CMS model. ST 3.1.5 ST 3.1.6 ST 3.1.7 ST 3.1.8 New CI type needed? Modification of CI type required? Create new CI type Configure CI types If a new CI type is needed, go to ST 3.1.7. If not, continue with ST 3.1.6. If a modification of the CI type is required, go to ST 3.1.8. If not, continue with ST 3.1.9. CMS/Tools Administrator CMS/Tools Administrator
The CMS/Tools Administrator adds a new CI type (device type). This CMS/Tools includes the definition of CI attributes and screen design. Administrator Create or modify the definition of the CI type. This includes: CI subtypes Attribute definitions Screen design CI relationships types Naming conventions Business rules on required fields CMS/Tools Administrator
205
Table 15-1 Configuration Management Planning process (contd) Process ID ST 3.1.9 Procedure or Decision Configuration Management policies update required? Maintain Configuration Management policies
Description The Configuration Administrator determines whether the Configuration Management policies must be updated (to reflect the SCAM plan). If so, go to ST 3.1.10. The Configuration Manager maintains the Configuration Management policies. Policies may be applicable for specific asset types (or CI Types) or services. Policies may include business rules and requirements for specific information to be maintained in the CMS (for example, for compliance purposes or to monitor contracts). Policies determine how often a configuration audit is required. Policies also designate which data in a CI may be updated by inventory tools, as well as what actions must be performed if unauthorized software is detected. Other items covered by policies and business rules include: Naming conventions Labeling rules Asset capitalization rules (for example, to set the depreciation start date) Procedures for lost or stolen items
ST 3.1.10
Configuration Manager
ST 3.1.11
Configuration Management policies and requirements are translated into tool settings (for example, required fields, schedule for automated inventory and discovery, and reconciliation rules).
CMS/Tools Administrator
Configuration Identification is responsible for collecting information about CIs and their relationships, and for loading this information into Configuration Management. Configuration Identification is also responsible for labeling the CIs, which enables the corresponding configuration records to be found. Details for this process can be seen in the following figure and table.
206
Chapter 15
207
Table 15-2 Configuration Identification process Process ID ST 3.2.1 Procedure or Decision Validate task for configuration creation
Description The Configuration Administrator reviews the task to verify that all required information to create a new configuration is complete and correct. Configuration describes a group of CIs that work together to deliver an IT Service, or a recognizable part of an IT Service. The term configuration can also refer to the parameter settings for one or more CIs. If the information is correct and complete, continue with ST 3.2.3. If not, go to ST 3.2.15 (reject task). Determine the CI type(s) needed to register the CIs. A CI type is used as a template to document the CI, including, attributes and required fields. A CI can only be registered if the CI type is known and a Configuration Management policy is available for these types. Existing types must match the attributes that need to be managed and allow designation of a person who is responsible for maintaining the CI. CIs of a registered type can be used as templates for new CIs. If there are existing CI types, continue with ST 3.2.5. If not, go to ST 3.2.15 (reject task).
ST 3.2.2 ST 3.2.3
ST 3.2.4
ST 3.2.5
Existing model?
Verify that the models (the product definition from the manufacturer or supplier) for the configuration exist. A model refers to the product catalog defining the approved and certified list of components, which can be deployed within the IT environment. If there are no models, go to ST 3.2.6 to create a new model. If yes, continue with ST 3.2.7 (create new configuration). Create a new model. The model contains information, such as the Model name, Manufacturer, and ID of component discovered by monitoring tools (for example, software component name). Create the CIs part of the configuration. One or more CIs can be created. Select the CI type (template). Select the model.
Configuration Administrator
ST 3.2.6
ST 3.2.7 ST 3.2.8
Populate configuration Enter the required CI attributes, according to the Configuration details Management policies. Capture relationships and dependencies between the CIs. Depending upon the CI type and business rules, examples of details include: Serial number location (for example, on stock) Purchase order number Receipt date warranty conditions and warranty end date CI specific attributes
208
Chapter 15
Table 15-2 Configuration Identification process (contd) Process ID ST 3.2.9 Procedure or Decision Register ownership and support groups
Description All CIs must be assigned to an owner (that is, a reference to an organizational entity such as a cost center) and an administrator (the group responsible for managing the CI during its life cycle). Activities include: Assign owner Assign Configuration Administrator (group) Assign support group for incident assignment (for example, if needed for automated assignment in case of events detected on the device) Maintenance or support contracts Financial contracts (for example, lease or rental) License contract or service contracts (for example, SLA, UC, and OLA)
ST 3.2.10
Configuration Administrator
If no contracts are relevant for this Configuration, go to ST 3.2.12. If yes, continue with ST 3.2.11 to link the items to the contract. ST 3.2.11 Match and relate to contract(s) Labeling of configuration required? Link the CIs to one or more contracts. Capture the inclusion date of the CI to the contract. If needed, inform the Contract Manager of the new items attached to the contract. Determine whether CIs need to be labeled according to the Configuration Management policies. If not, go to ST 3.2.14. If yes, continue with ST 3.2.13. Configuration Administrator Configuration Administrator Configuration Administrator Configuration Administrator Configuration Administrator Configuration Administrator
ST 3.2.12
Create and attach label Create and print a label. Physically attach the label to the CI. Close Configuration Management task Reject task Inform requester After completion, the task can be closed. Update closure code. If the task cannot be completed, reject the task. Update the task with reasons and details of any issues found. Inform the requester of the completion or rejection. If needed, provide additional information, such as the reason and advice on appropriate next steps.
210
Table 15-3 Configuration Control process Process ID ST 3.3.1 ST 3.3.2 Procedure or Decision
Description
Review Configuration The Configuration Administrator reviews the task for updating the Management task Configuration Management System (CMS). New configuration? If the task refers to the creation of one or more new CIs, go to ST 3.2.1 and follow the procedure to validate a task for CI creation. If the task is related to the modification of an existing CI, continue with ST 3.3.3.
ST 3.3.3
Verify that all information to update the CIs is available and correct. Configuration The task should refer to at least one CI that must be updated. The Administrator task contains a description of the attributes to be modified. If not all information is complete and correct, go to ST 3.3.9 (reject task). If yes, continue with ST 3.3.4. Before the modification is implemented, the current state of the CIs must be reviewed to verify the expected starting point for the change. Verify the proposed modifications to ensure that these are correct and complete (that is, according to Configuration Management policies). If the configuration modification is correct, continue with ST 3.3.7. If not, go to ST 3.3.9 (reject task). Modify the configuration details in the Configuration Management database. Configuration modifications can include: Status (items transferred from test to production or to retirement) Location (moves) Relationships and dependencies Installation of software on the item Transfer of ownership Assign contract to a CI Configuration Administrator Configuration Administrator Configuration Administrator Configuration Administrator Configuration Administrator
ST 3.3.4
Examine current configuration Assess configuration modifications Configuration modification correct? Adjust configuration details
ST 3.3.5
ST 3.3.6 ST 3.3.7
If the configuration update cannot be completed, the task is rejected. Configuration A reason and recommended actions must be provided. Administrator The requester is informed of the closure or rejection of the task. Continue with ST 2.6.1 (Change Review and closure). Configuration Administrator
211
Current and accurate configuration records should be maintained to reflect changes in the status, location, and versions of CIs. The history of each CI must be maintained. Changes to CIs are tracked through various states, such as ordered, received, in acceptance test, live, under change, withdrawn, or disposed. Where required, configuration information should be accessible to users, customers, suppliers, and partners to assist them in their planning and decision making. For example, an external service provider may make configuration information accessible to the customer and other parties to support the other service management processes in an end-to-end service. Archiving procedures should be defined for data related to retired or disposed CIs. Configuration Management reports should be available to all relevant parties. The reports should cover the identification and status of the CIs, including their versions and associated documentation. A large set of different reports are needed for the different stakeholders (for example, audit reports, software compliance reports, and charge back reports). Details for this process can be seen in the following figure and table.
212
Chapter 15
213
Table 15-4 Configuration Status Accounting and Reporting process Process ID ST 3.4.1 Procedure or Decision Review CI update
Description Modifications of key attributes of the CI are logged in the history log and verified. During Configuration Identification and control activities, configuration status records are created. These records enable key changes to be visible and traceable. CI attributes that can be logged include: status (for example, system down) version number serial number installation date audit status (for example, missing or lost) removed from a contract
Critical CI changes are logged with entries for reason, date stamp, time stamp, and person recording the status change. ST 3.4.2 Key life cycle change? Determine whether the modification must be reviewed or validated, based on the documented Configuration Management policies (and policies related to finance, procurement, Contract Management, and security). Specific life cycle events must be reported to the stakeholders. These include: Procurement Finance (for example, by linking to the general ledger) Contract Manager Configuration Auditor
ST 3.4.3
Configuration Auditor
Verify that the event must be reported. If not, go to ST 3.4.5. If yes, continue with ST 3.4.4. ST 3.4.4 Inform stakeholders Inform stakeholders of the event (for example, the Contract Manager when an asset is included in the contract, or procurement when an item is received). Examples of events that should trigger stakeholder notification include: ST 3.4.5 Validate configuration update Received and accepted items Installation of the asset (for example, for depreciation start date) Lost or stolen item Retirement or disposal of an item (for finance) Configuration Auditor Configuration Auditor
Confirm that all relevant status data documented in the CI is complete and correct, according to Configuration Management policies derived from agreements, relevant legislation, and standards. Ensure that the status change or version update is a result of an authorized change.
ST 3.4.6 ST 3.4.7
Exception detected? If the CI update or CI details are not correct or complete according to the Configuration policies, continue with SO3.4.7. Create exception report Create a new incident (see SO 2.1.11).
214
Chapter 15
Table 15-4 Configuration Status Accounting and Reporting process (contd) Process ID ST 3.4.8 ST 3.4.9 Procedure or Decision Review report request Standard report?
Description The Configuration Administrator reviews the request for Configuration Management information. Configuration Management has defined a number of standard reports (for example, overview of CIs in stock or by status). If this is a standard report, continue with ST 3.4.12. If not, go to ST 3.4.11. Periodically, Configuration Management procedures provide reports for the different stakeholders, such as financial asset managers, contract managers, or procurement. If a standard report does not exist, the Configuration Administrator creates a query to select the data to display from the CMS. The report or query is run against the database. The data is collected in a standard format. Provide the requested data to the stakeholders. Close the request (if applicable).
Role Configuration Administrator Configuration Administrator Configuration Administrator Configuration Administrator Configuration Administrator Configuration Administrator
ST 3.4.10
Collect data for status reports Configure CI report Run configuration report Distribute report to stakeholders
Confirm that the current environment is as expected and documented in the CMS, and that any Change requests are resolved Check that configuration modifications are implemented through authorized changes Validate the existence of a SLA against each CI Verify that CI specifications are compliant with defined configuration policies and baselines Validate that all required documentation for each CI is available (for example, maintenance contracts, license records, or warranties) Check data quality for accuracy and completeness Initiate an incident ticket for discovered unauthorized changes Unauthorized software installed Unauthorized access to resources and services (for example, access rights not reflected in subscriptions) Discrepancy of status or configuration details, as registered in the CMS, compared with the actual status.
Configuration Verification and Audit processes, both physical and functional, should be scheduled and a check performed to ensure that adequate processes and resources are in place. Benefits of this process include: Protection of the physical configurations and the intellectual capital of the organization Verification that the service provider is in control of its configurations, master copies, and licenses Confidence that configuration information is accurate, controlled, and visible Conformance of changes, releases, systems, and IT environments to contracted or specified requirements. Accuracy and completeness of configuration records
Configuration audits should be carried out regularly, before and after a major change (or release), after a disaster, and at random intervals. Deficiencies and nonconformities should be recorded, assessed and corrective action initiated, acted on, and reported back to the relevant parties and plan for improving the service. Unauthorized and unregistered items that are discovered during the audit should be investigated and corrective action taken to address possible issues with procedures and the behavior of personnel. All exceptions are logged and reported as incidents. Details for this process can be seen in the following figure and table.
216
Chapter 15
217
Table 15-5 Configuration Verification and Audit process Process ID ST 3.5.1 ST 3.5.2 Procedure or Decision Audit required? Conduct configuration audit
Description Configuration audits should be considered before and after a major change or release. Configuration audits (manual or automated) are scheduled periodically. The audit verifies each individual CI. It uses an automated inventory tool that scans the system. Another method is to scan the IT environment and discover the component connected to the enterprise. New components may be discovered, requiring management in the CMS. Collected data from the audit must be reconciled and compared with the data already stored in the CMS. Different reconciliation keys and rules can be applied to match the discovered item with the CI in the CMS. An unregistered component may be detected in cases where the item cannot be matched and found in the CMS. If an unregistered component is detected, go to ST 3.5.5. If not, continue with ST 3.5.8. Determine whether the new component needs to be registered in the CMS, based on the scope of the CMS. If yes, continue with ST 3.5.6. If no, go to ST 3.5.13. The CI type is selected, based on the properties of the discovered component (for example, model name or type of device). Create a new CI. Enter the additional attributes of the CI, based on the audit data. Go to ST 3.5.13. If a component cannot be discovered during an audit, it may be lost or stolen (for example, the CI has not been connected to the network for some period of time). The audit status is updated to Lost. If yes, continue with ST 3.5.13. If no, continue with ST 3.5.9. Based upon the comparison between the CMS administration and the actual data from the audit, one or more discrepancies may be detected. If yes, continue with ST 3.5.10. If not, continue with ST 3.5.15. The mismatch between the CMS administration and the actual configuration is investigated in more detail. For each discrepancy, attribute differences and relationships are investigated.
ST 3.5.3
Configuration Auditor
ST 3.5.4
Configuration Auditor
ST 3.5.5
Component needs to be managed? Determine CI type Register new configuration Component missing?
ST 3.5.9
Discrepancy found?
Configuration Auditor
ST 3.5.10
Investigate discrepancy
Configuration Auditor
ST 3.5.11
To reduce the number of manual activities, some fields are Configuration populated by discovery and auditing tools. These attributes will Auditor not be maintained manually. Determine whether the differences can be updated directly without a formal change procedure. If yes, continue with ST 3.6.12. If no, go to ST 3.5.13. The configuration details are updated, based on the audit date to ensure that the administration is correctly reflecting the actual situation. Configuration Auditor
ST 3.5.12
218
Chapter 15
Table 15-5 Configuration Verification and Audit process (contd) Process ID ST 3.5.13 Procedure or Decision
Description
Unauthorized change or Determine whether the mismatch between the audit and the CMS needs investigation? administration requires further investigation (for example, detection of unauthorized software). If yes, go to ST 3.5.14. If no, continue with ST 3.5.15. Determine corrective action Document the discrepancy and determine the appropriate actions (for example, additional investigation is needed). An incident must be created and assigned to the person responsible for executing the actions. Follow SO 2.1.11 to create a new incident. The CI is updated with the audit status and last audit date.
ST 3.5.14
Configuration Auditor
ST 3.5.15
Configuration Auditor
219
220
Table 15-6 Master data management process Process ID ST 3.6.1 Procedure or Decision
Description
Validate data sets Periodically data sets are received from trusted sources. The Configuration Administrator checks the format and content against the defined specifications. Import location data? If you want to import location data, continue with ST 3.6.3. If not, go to ST 3.6.4.
ST 3.6.2
ST 3.6.3
ST 3.6.4
If you want to import organizational data, continue with ST 3.6.5. If not, go to ST 3.6.6.
ST 3.6.5
ST 3.6.6
If you want to import employee data, continue with ST 3.6.7. If not, stop. System Administrator Configuration Administrator
ST 3.6.7
ST 3.6.8
Verify that one or more items in the data set are retired or no longer present. Make sure to update the status of items in the CMS.
221
Table 15-6 Master data management process (contd) Process ID ST 3.6.9 Procedure or Decision Check related configurations
Description Verify that one or more CIs are still related to retired items in the modified master data record. For example, a retired user may still have one or more subscriptions or CIs for which that user is responsible. Updates of interest include: Status updates (for example, retirement) Job profile changes (for validating access rights and related current subscriptions) Reorganizations (for example, merge or split of departments) Cost center changes
Master data modifications must be verified to ensure that these updates do not conflict with configuration administration. ST 3.6.10 Related active configuration? If there is a related active configuration, continue with ST 3.6.11. If not, go to ST 3.6.12. System Administrator Configuration Administrator ST 3.6.11 Determine corrective actions Create data reconciliation report Follow the procedure to create a new incident (see SO 2.1.11). System Administrator Configuration Administrator Create a report with a summary of data modifications and reconciliation errors, which includes statistics of the number of modifications (for example, new items and retired items). System Administrator Configuration Administrator
ST 3.6.12
222
Chapter 15
HP Service Manager uses the Configuration Management application to enable the Configuration Management process. The main function of Configuration Management is to identify, baseline, and maintain the Configuration Items (CIs) and to control changes to them. It also ensures that formal approvals guide releases into controlled environments and operational uses. This section explains to the administrator or developer how selected Configuration Management fields are implemented in the out-of-box Service Manager system. Topics in this section include: MyDevices configuration item form on page 224 Configuration Management form details on page 225 Configuration Item types and subtypes on page 229
223
224
Chapter 16
Status
The field is updated manually to reflect the current status of the CI. This is a required field. The Installed status is the default status. Assignments > Owner Assignments > Config admin group This field identifies the department that owns the CI, for example, the HR department could own the laptops that its employees use. This field identifies the group responsible for supporting the CI while the Owner identifies the department that owns the CI. For example, a PC is owned by the HR department, but IT is the Config admin group responsible for supporting the CI. It is the assignment group responsible for handling interactions or incidents for the CI. This is a required field. This field identifies what assignment groups receive tickets when this CI is part of an interaction as well as when escalating to an incident. This field is a comment field intended to describe or provide notes for the support groups. This field specifies the inventory component number for the CI as defined by the company-defined CI inventory number in the model table. The system uses this number to provide data on the Manufacturer, Model, and Version fields if available. This is a system-generated field that specifies the manufacturer of the CI if one is associated with the Part Number. This field along with model and serial number uniquely identify the CI. This is a system-generated field that specifies the manufacturers model if one is associated with the Part Number. This field along with manufacturer and serial number uniquely identify the item.
Assignments > Support Groups Assignments > Support Remarks Assignments > Part Number Model > Manufacturer Model > Model
225
Table 16-1 Configuration Management field descriptions (contd) Label Model > Version Model > Serial Number Model > Title Model > Description Classification > CI Type Description This field specifies the manufacturers version number for the CI. This field specifies the manufacturers serial number for the CI. This field specifies the title of the primary user of the CI; for example Mr. or Mrs. This field is a free-form text field to add additional information about the CI. This field identifies the type of CI. The out-of-box data is: Application Business Service CI Group Computer Display Device Example Furnishings Hand Held Devices Mainframe Network Components Office Electronics Software License Storage Telecommunications
The Managed State notebook tab displays different fields depending up the CI type selected. Classification > CI Subtype Classification > Environment This field identifies the subtype of CI. The list of available subtypes depends upon the CI Type the user selected. For more information see Table 16-2 on page 230. This field specifies if a CI belongs to a particular environment. The out-of-box data is: Classification > Security classification Development Test Production Failover None Unrestricted Restricted Confidential Most Confidential
This field specifies if the CI has any security restrictions. The out-of-box data is:
226
Chapter 16
Table 16-1 Configuration Management field descriptions (contd) Label Classification > OX classification Description This field specifies if the CI has a Sarbanes Oxley (SOX) classification that applies to the CI. The out-of-box data is: Classification > Export control classification Critical Non Critical EAR99 (Non Controlled) 4D994 5D991 5D002 5D992
This field specifies if the CI has an Export Control classification. The out-of-box data is:
Classification > This field specifies if the CI has an IT service continuity plan enabled for it. IT service continuity plan enabled Classification > Critical CI Classification > Priority This field specifies if the CI is critical for day-to-day operation, such as an E-mail server or RDBMS server. If you open an incident on a critical CI, the incident ticket indicates that this is a critical CI. This field specifies the default priority of any related records opened against the CI. The information in this field is used to prepopulate the priority in an incident or interaction. When a user selects the CI in an incident or interaction, it populates the incident or interaction priority based on the CI priority field. The out-of-box data is: Classification > Default Impact 1 - Critical 2 - High 3 - Average 4 - Low
For additional information see, Table 7-1 on page 88. This field specifies the default impact of any related record opened against the CI. the information in this field is used to prepopulate the impact in an incident or interaction. When a user selects the CI in an incident or the interaction, it populates the incident or interaction impact based on the CI Default Impact field. The out-of-box data is: Classification > Calculate Related Record Counts Classification > User Base Classification > System Down 1 - Enterprise 2 - Site/Dept 3 - Multiple Users 4 - User
For additional information see, Table 7-1 on page 88. This field displays a count of related incidents, problems, known errors, and changes that were opened against this CI. This field displays a count of the number of users who use the CI. This field indicates whether the CI is currently operational or has an open incident related to it causing it to be non-operational. When you close the incident ticket for the CI, this action clears the flag. The CI is no longer marked as down.
227
Table 16-1 Configuration Management field descriptions (contd) Label Classification > Pending Change Classification > Allow Subscribe Baseline > Baseline Baseline > Baseline Version Description This field indicates whether or not there are any changes pending against this CI. When you close or open a change for the CI, this action sets or clears the flag. This field determines if the CI is available for subscriptions from the Service Catalog. This field indicates if the CI has an associated baseline and if the CI is in compliance. This field indicates the baseline version that the CI is tracked against. Baseline Versions enable you to have CIs with the same baseline configuration but slight differences. You can have several versions of that baseline, or if you have updates for a new version of a software installed, then you can select a specific version of a baseline for a CI. This notebook tab lists the expected values of CI attributes. All changes to fields in the Managed State notebook tab require a Change Management record. See Table 16-3 on page 233 for the Managed State sub-tab field descriptions. This notebook tab lists the actual values of CI attributes if the Service Manager system has an integration to HP Universal CMDB It shows the latest discovered information from the UCMDB or its sources. This field lists the attributes that are waiting to be changed through a Change Management record or changes requested through an Unplanned Change (requires an HP Universal CMDB integration). The data in this field can only be modified through Change Management. Each CI has a set of managed attributes that can be changed through Change Management. This field lists the attributes that are have already been changed through a Change Management record or changes requested through an Unplanned Change (requires an HP Universal CMDB integration). This field shows information about which upstream CIs are dependent on the selected CI. Upstream CIs depend on the current CI. For example, the upstream E-mail service depends on the downstream E-mail server, the network, and your E-mail program. This option links to the add a new CI relationship record that enables you to add a new upstream relationship to this CI. This option displays all logical CI relationships for the specified CI. A logical connection mean that you can acces the CI but there is no direct physical connections to s other CIs. For example, a network printer that you use. This option displays all physical CI relationships for the specified CI. A physical connection is when a CI is directly attached to another device. For example, a PC connected to a dedicated printer with printer cable. This option displays all CI relationships for this CI that are of either physical or logical. This option shows the CIs that have a downstream dependency on this CI. For example, the upstream E-mail service depends on the downstream E-mail server, the network, and your E-mail program.
Managed State
Actual State
CI Changes > Historic Attribute Changes Relationships > Upstream Configuration Item, Relationship Name, Relationship Type, Relationship Subtype Relationships > Add upstream relationship Relationships > Show Logical
Relationships > Show Physical Relationships > Show All Relationships > Downstream Relationships > Relationship Name, Relationship Type, Relationship Subtype
228
Chapter 16
Table 16-1 Configuration Management field descriptions (contd) Label Relationship Graph Subscribers > Subscriber, Type, Status Description This notebook tab displays a graphical representation of the upstream and downstream relationships for the CI. This is a system-generated notebook tab that shows all the subscriptions (people or departments) made against the CI, and the status of the subscription. Example: People and departments can subscribe to Services or CIs. When looking at an interaction, the Service Desk Agent views a list of all the CI the caller is subscribed to, and their current status. These fields display auditing information and are only enabled for those users who have the capability to audit CIs. The user role is Configuration Auditor.
Audit > Audit Policy, Audit Status, Audit Discrepancy, Last Audit Date, Next Scheduled Audit, Last Audited By Software > Applications & Drivers
This notebook tab displays information about the software and drivers installed on the CI. For example, a PC might list Microsoft Office and Adobe Reader along with the version, install date, and license ID for each. An Administrator enters this data using he Managed Software menu. This field displays the primary user who is the person assigned the CI and uses it on a day-to-day basis. Support contacts are secondary contacts who may have access to the CI. For example, a subscriber would be a department for a printer, but the users would be all the people who use the printer to print. The primary user is the person who is responsible for the printer, such as the department manager. This notebook tab describes the physical location of the CI and may include information such as special access requirements (for example, you may require badge access or you may need to be accompanied by authorized personnel in some locations). For example, the location information might contain, Australia, Home Site, main building, second floor, room 3. This notebook tab provides vendor information about the CI for support and maintenance. When the user enters the vendor name, the system provides the additional details. This notebook tab displays information related to the SLA and SLO availability data for the CI.
Vendor > Vendor Information, Address, & Contract and Response Information Metrics > Outage History, Uptime Objectives, Max Duration Objectives Financial > Contracts, Expense Lines, Labor, Parts Scanner
This notebook tab displays information for the service contracts, parts, labor, and expenses for the CI. This notebook tab provides information about any scanning done on the CI. The information includes the last time this CI was scanned and the date and time of the scan. Scanning can be done to detect viruses or determine the software installed on the CI.
229
Table 16-2 Configuration Item types and subtypes CI Name Application CI Type application CI Subtype Anti-Virus / Security Back-up Business Development Tools Entertainment Graphics Internet/Web Networking Operating System Reference Other Business Service Application Service Infrastructure Service Ad Hoc Baseline Desktop Dumb Terminal Laptop Tower MAC Server Host VAX Windows Unix Mainframe Logical Partition Terminal Server Display Device Example Furnishings displaydevice example furnishings Artwork Armoire Bookcase Chair Computer Desk Desk Collection File Cabinet Meeting Table PDA Cell Phone Pager Blackberry Device GPS Device Monitor Projector
Business Service
bizservice
CI Group Computer
cigroup computer
handhelds
230
Chapter 16
Table 16-2 Configuration Item types and subtypes (contd) CI Name Mainframe CI Type mainframe CI Subtype Controller Host CPU FEP NCP LPAR Router Hub Switch Modem Network Interface Card Gateway Firewall Network Component ATM Switch RAS LB Concentrator Net Device Switch Router Copy Machine Printer Fax Machine Paper Shredder Camera Speaker Calculator Multifunction Word Processor Typewriter VCR Television UPS Net Printer
Network Components
networkcomponents
Office Electronics
officeelectronics
231
Table 16-2 Configuration Item types and subtypes (contd) CI Name Software License CI Type softwarelicense CI Subtype DBMS License Development Tool License Enterprise Management License Operating System License Outlook Productivity Tools License Project Management License Utility Software License CDRW Direct Attached Storage (DAS) HDD Network Attached Storage (NAS) Storage Area Network (SAN) ZIP CD Burner Desk Phone Flush Wall Mount Headsets & Accessories NBX PBX Paging Solution Surface Mount
Storage
storage
Telecommunications
telcom
232
Chapter 16
Network tru
Application
Database
Type: database
233
Table 16-3 Managed State sub-tabs (contd) Sub-Tab Telecom T Visible Condition ype: telecom Field Label Admin ID Admin Password Remote Access Phone Remote Access IP Voice type Disaster/Recovery Coverage Disaster/Recovery Tier Grid Login Server Name Monitored Service Name Service Type Service Status Allow Subscriptions Administration URL/Port Business Import Level Disaster/Recovery Coverage Disaster/Recovery Tier Primary Directory Path Manufacturer Name Type Description Field Name admin.id admin.password remote.phone remote.ip NULL disaster.recovery recorvery.tier grid login.server.name monitored ci.name subtype service.status allowSubscription admin.urlport NULL NULL recorvery.tier primary.path addl.manufacturer addl.name addl.type addl.description
Service T
ype: bizservice
Additional
true
234
Chapter 16
8.1.2 Workarounds
Logging and maintenance of workarounds is performed in all of the procedures above 8.2 Incident Management 8.2.1 General Proactive and reactive process, responding to incidents that affect, or potentially could affect the service Concerned with the restoration of the customers' service, not with determining the cause of incidents. Incident Management > Incident Logging (SO 2.1) Incidents can be created based on user interactions as well as based on events. Incident Management > Incident Resolution and Recovery (SO 2.4) Incidents are preferably solved by means of a workaround leaving the structural solution to the Problem Management process.
235
Service Manager coverage of the ISO 20000 Code of Practice (contd) Service Manager Best Practices Coverage Interaction Management > Interaction Handling (SO 0.2) Interaction Management > Interaction Handling (SO 0.2) Interaction Management > Interaction Handling (SO 0.2) Security is one of the areas that you can select when registering an interaction. Incident Management > Monitor SLA (SO 2.7) Incident Management > OLA and UC Monitoring (SO 2.8)
a) call reception, recording, priority assignment, classification b) first line resolution or referral c) consideration of security issues
d) Incident tracking and lifecycle management e) Incident verification and closure f) first line customer liaison g) escalation Incidents may be reported by telephone calls, voice mails, visits, letters, faxes or email, or may be recorded directly by Users with access to the incident ticketing system, or by automatic monitoring software. Progress (or lack of it) in resolving incidents should be communicated to those actually or potentially affected.
Interaction Management > Interaction Closure (SO 0.3) Interaction Management > Interaction Handling (SO 0.2) Incident Management > Incident Escalation (SO 2.6) Interaction Management > Self-Service by User (SO 0.1) Interaction Management > Interaction Handling (SO 0.2)
Final closure of an incident should only take place Interaction Management > Interaction Closure (SO 0.3) when the initiating User has been given the opportunity to confirm that the incident is now resolved and service restored. 8.2.2 Major Incidents There should be a clear definition of what constitutes a major incident and who is empowered to invoke Changes to the normal operation of the incident/Problem process. All major incidents should have a clearly defined responsible manager at all times 8.3 Problem management 8.3.1 Scope of Problem Management 8.3.2 Initiation of Problem Management Incidents should be classified to help determine the causes of Problems. Classification may reference existing Problems and Changes. Incident Management > Incident Closure (SO 2.5). Upon closure the incident classification should be reviewed and adjusted if needed. Problem Management (SO 4) Incident Management > Monitor SLA (SO 2.7) Incident Management > OLA and UC Monitoring (SO 2.8)
Escalation triggers are clearly defined, including the process roles responsible for triggering the escalation. Incident Management > Incident Escalation (SO 2.6) The responsible process roles for this procedure are clearly defined.
236
Chapter A
Service Manager coverage of the ISO 20000 Code of Practice (contd) Service Manager Best Practices Coverage Problem Management > Known Error Logging and Categorization (SO 4.4) Problem Management > Known Error Investigation (SO 4.5) Problem Management > Known Error Solution Acceptance (SO 4.6) Problem Management > Known Error Resolution (SO 4.7)
Problem Management > Known Error Solution Acceptance (SO 4.6). The implementation of the solution is requested to the Change Management process
8.3.5 Communication
Interaction Management > Interaction Handling (SO 0.2) Matching with published Known errors takes place. Incident Management > Incident Investigation and Diagnosis (SO 2.3) Matching with published known errors takes place. Problem Management (SO 4) Known error information is logged and maintained throughout the whole Problem Management process.
8.3.6 Tracking and Escalation 8.3.7 Incident and Problem Ticket Closure 8.3.8 Problem Reviews 8.3.9 Topics for Reviews 8.3.10 Problem Prevention Control Processes 9.1 Configuration Management 9.1.1 Configuration Management Planning and implementation 9.1.2 Configuration Identification 9.1.3 Configuration Control 9.1.4 Configuration Status Accounting and Reporting 9.1.5 Configuration Verification and Audit 9.2 Change Management 9.2.1 Planning and Implementation
Problem Management > Problem and Known Error Monitoring (SO 4.9) Problem Management > Problem Closure and Review (SO 4.8) Problem Management > Problem Closure and Review (SO 4.8) Problem Management > Problem Closure and Review (SO 4.8) Problem Management > Problem Detection, Logging, and Categorization (SO 4.1)
Configuration Management > Configuration Management Planning (ST 3.1) Configuration Management > Configuration Identification (ST 3.2) Configuration Management > Configuration Control (ST 3.3) Configuration Management > Configuration Status Accounting and Reporting (ST 3.4) Configuration Management > Configuration Verification and Audit (ST 3.5)
Change Management > Change Assessment and Planning (ST 2.3) Change Management > Change Approval (ST 2.4) Change Management > Coordinate Change Implementation (ST 2.5)
237
Service Manager coverage of the ISO 20000 Code of Practice (contd) Service Manager Best Practices Coverage Change Management > Change Evaluation and Closure (ST 2.6) Change Management > Emergency Change Handling (ST 2.7) Change Management > Change Evaluation and Closure (ST 2.6)
9.2.2 Closing and Reviewing the Change request 9.2.3 Emergency Changes 9.2.4 Change Management Reporting, Analysis and Actions
238
Chapter A
AI6 Manage Changes AI6.1 Change Standards and Procedures AI6.2 Impact Assessment, Prioritization and Authorized AI6.3 Emergency Changes AI6.4 Change Status Tracking and Reporting Change Management (ST 2) Change Management > Change Approval (ST 2.4) Change Management > Change Assessment and Planning (ST 2.3)
Change Management > Emergency Change Handling (ST 2.7) Change Management > Change Logging (ST 2.1) Enables the logging of Changes in the Service management tool Change Management. Change Management > Change Assessment and Planning (ST 2.3) Planning is created which' after approval' leads the Change implementation.
DS1 Define and Manage Service Levels DS1.2 Definition of Services Configuration Management (ST 3) Business Services are stored in the Configuration Management System and related to the CI's supporting the Service. Incident Management > Monitor SLA (SO 2.7) The main aspect of the Service Manager best practices and the Configuration of Service Manager is its Service orientedness. Target response times for all Interactions and related tickets are set according to SLAs with the users representatives.
239
Service Managers coverage of COBIT 4.1 Controls (contd) Service Manager best practices coverage Incident Management > OLA and UC Monitoring (SO 2.8) Service Manager is configured to enable measurement of OLSs
DS2 Manage Third-party Services DS2.4 Supplier Performance Monitoring Incident Management > OLA and UC Monitoring (SO 2.8) Service Manager is configured to enable measurement of UCs.
DS8 Manage Service Desk and Incidents DS8.1 Service Desk DS8.2 Registration of Customer Queries DS8.3 Incident Escalation DS8.4 Incident Closure Interaction Management > Interaction Handling (SO 0.2) Interaction Management > Interaction Handling (SO 0.2) Incident Management > Incident Escalation (SO 2.6) DS9 Manage the Configuration DS9.1 Configuration Repository and Baseline DS9.2 Identification and Maintenance of Configuration Items DS9.3 Configuration Integrity Review Configuration Management (ST 3) DS10 Manage Problems DS10.1 Identification and Classification of Problems DS10.2 Problem Tracking and Resolution DS10.3 Problem Closure DS10.4 Integration of Configuration, Incident and Problem Management Problem Management > Problem Detection, Logging, and Categorization (SO 4.1) Problem Management > Problem Prioritization and Planning (SO 4.2) Problem Management > Known Error Logging and Categorization (SO 4.4) Problem Management > Problem Investigation and Diagnosis (SO 4.3) Problem Management > Known Error Investigation (SO 4.5) Problem Management > Known Error Solution Acceptance (SO 4.6) Problem Management > Problem and Known Error Monitoring (SO 4.9). Problem Management > Known Error Resolution (SO 4.7) Problem Management > Problem Closure and Review (SO 4.8) Configuration Management > Configuration Identification (ST 3.2) Configuration Management > Configuration Control (ST 3.3) Configuration Management > Master data management (ST 3.6) Configuration Management > Configuration Status Accounting and Reporting (ST 3.4) Configuration Management > Configuration Verification and Audit (ST 3.5) Incident Management > Incident Closure (SO 2.5) Interaction Management > Interaction Closure (SO 0.3)
Problem Management > Problem Detection, Logging, and Categorization (SO 4.1) Problems are identified based on incident tickets.
240
Chapter A
241
Important fields in the incidents table (contd) Field Name kpf.id resolution.code resolution open approval.status
Interaction Detail tab > Knowledge Source Interaction Detail tab > Closure Code Interaction Detail tab > Solution Status Approval Status
242
Chapter B
Important fields in the probsummary table (contd) Field Name downtime.start downtime.end location.full.name brief.description action category subcategory product.type initial.impact severity priority.code contract.id next.breach status prob.mgmt.candidat solution.candidate resolution.code resolution affected.services
Affected Items > Outage Start Affected Items > Outage End Location Title Description Incident Detail > Category Incident Detail > Area Incident Detail > Sub-area Incident Detail > Impact Incident Detail > Urgency Incident Detail > Priority Incident Detail > Service Contract Incident Detail > SLA target Date Incident Detail > Alert Status Incident Detail > Problem Management Candidate Incident Detail > Candidate for Knowledge DB Incident Detail > Closure Code Incident Detail > Solution Affected Services tab
243
Problem Control
Many important fields for the Problem Management application are located in the rootcause table. The label on the form may not always match the field name in the table. This table associates the label and the field name in the rootcause table. Table B-3 Label Problem ID Phase Status Assignment > Assignment Group Assignment > Problem Coordinator Affected Items > Services Affected Items > Primary CI Affected Items > Affected CI Count Title Description Root Cause Description Problem Detail > Category Important fields in the rootcause table Field Name id current.phase rcStatus assignment asignee.name affected.item logical.name affected.ci.count brief.description description root.cause incident.category Note: The problem category is not displayed on the problem forms. The category displayed on the problem forms is the Incident category. subcategory
244
Chapter B
Important fields in the rootcause table (contd) Field Name product.type initial.impact severity priority.code next.breach rootcauseDate solutionDate
Problem Detail > Sub-area Problem Detail > Impact Problem Detail > Urgency Problem Detail > Priority Problem Detail > SLA Target Date Problem Detail > Root Cause Target Date Problem Detail > Solution Target Date (Solution Identification Date) Problem Detail > Resolution Target Date (Problem Resolution Date) Problem Detail > Related Incident Count Incident Detail > Closure Code Problem Detail > Suggested Workaround Assessment > Estimated # of Mandays Assessment > Estimated Costs Assessment > Affected CI's table
expected.resolution.time
245
Error Control
Another important table in the Problem Management application is the knownerror table. The known error forms use the fields from the knownerror table. The label on the form may not always match the field name in the table. This table associates the label and the field name in the knownerror table. Table B-4 Label Known Error ID Phase Status Assignment > Assignment Group Assignment > Problem Coordinator Affected Items > Services Affected Items > Primary CI Affected Items > Matching CI Count Title Description Root Cause Description Known Error Detail > Category Known Error Detail > Area Known Error Detail > Sub-area Known Error Detail > Impact Known Error Detail > Urgency Known Error Detail > Priority Known Error Detail > Solution Identified Date Known Error Detail > Known Error Resolution Date Important fields in the knownerror table Field Name id current.phase rcStatus assignment assignee.name affected.item logical.name matching.ci.count brief.description description root.cause incident.category subcategory product.type initial.impact severity priority.code solutionDate expected.resolution.time
246
Chapter B
Important fields in the knownerror table (contd) Field Name interaction.count closure.code workaround resolution estimatedMandays estimatedCost matching.ci
Known Error Detail > Related Interaction Count Known Error Detail > Closure Code Known Error Detail > Workaround Known Error Detail > Solution Assessment > Estimated # of Mandays Assessment > Estimated Costs Assessment > Matching configuration Item List
247
Important fields in the cm3r table (contd) Field Name coordinator affected.item assets location.full.name brief.description description category emergency releaseCandidate initial.impact
Assignment > Change Coordinator Affected CI > Service Affected CI > Affected CI Location Title Description Change Detail > Category Change Detail > Emergency Change Change Detail > Release Management Change Detail > Impact
248
Chapter B
Important fields in the device table (contd) Field Name manufacturer model version serial.no title comments type subtype environment securityClassification soxClassification expcClassification device.severity problem.priority default.impact useBase is.down pending.change allow.subscription baseline baseline.version auditPolicy auditStatus auditDescrepency auditDate scheduledAudit auditBy
Model > Manufacturer Model > Model Model > Version Model > Serial Number Model > Title Model > Description Classification > CI Type Classification > CI Subtype Classification > Environment Classification > Security classification Classification > SOX classification Classification > Export control classification Classification > Critical CI Classification > Priority Classification > Default Impact Classification > User Base Classification > System Down Classification > Pending Change Classification > Allow Subscribe Baseline > Baseline Baseline > Baseline Version Audit > Audit policy Audit ->Audit status Audit > Audit discrepancy Audit > Last audit date Audit > next scheduled audit Audit > Last audited by
249
250
Chapter B
Index
A
alerts, Problem Management, 97 applications Change Management, 145 to 189 relationship with other applications, 21 Configuration Management, 191 to 234 relationship with other applications, 21 Incident Management, 53 to 94 relationship with other applications, 20 Problem Management, 95 to 141 relationship with other applications, 20 Service Desk, 23 to 52 relationship with other applications, 20
C
categories, 147 change analyst, Change Management user role, 169 to 182 change approval process table, 172 workflow diagram, 171 change approver Change Management user role, 172 to 173 change assessment and planning process table, 169 workflow diagram, 168 change coordinator Change Management user role, 161 to 181 Problem Management user role, 124 to 126 change evaluation and closure process table, 178 workflow diagram, 177 change logging process table, 163 workflow diagram, 162 Change Management, 145 to 189 application, 146 categories, 147 forms form details, 185 to 189 new change request, 184 input, 157 ITIL function, 146
KPIs COBIT, 158 ITIL, 158 Service Manager, 157 output, 157 process diagram, 148 processes, 145 to 189 change approval, 170 to 173 change assessment and planning, 167 to 170 change evaluation and closure, 177 to 178 change logging, 161 to 164 change review, 164 to 166 coordinate change implementation, 173 to 176 emergency change handling, 179 to 182 overview, 147 process tables change approval, 172 change assessment and planning, 169 change evaluation and closure, 178 change logging, 163 change review, 166 coordinate change implementation, 175 emergency change handling, 181 RACI matrix, 159 relationship with other applications, 21 service transition, 146 user roles, 156 change analyst, 156, 169 to 182 change approver, 156, 172 to 173 change coordinator, 156, 161 to 181 change manager, 156, 172 to 182 e-cab, 156, 179 to 181 problem manager, 161 to 166 release manager, 161 to 166 release packaging and build manager, 156, 179 to 182 service desk agent, 161 to 163 workflow diagrams change approval, 171 change assessment and planning, 168 change evaluation and closure, 177 change logging, 162 change review, 165 coordinate change implementation, 174 emergency change handling, 180
251
change manager, Change Management user role, 172 to 182 change review process table, 166 workflow diagram, 165 cms/tools administrator, Configuration Management user role, 199, 205 to 206 COBIT, 13 Change Management KPIs, 158 Configuration Management KPIs, 201 Incident Management KPIs, 59 Problem Management KPIs, 102 User Interaction Management KPIs, 29 complaint handling process table, 83 workflow diagram, 83 configuration administrator, Configuration Management user role, 206 to 222 configuration auditor, Configuration Management user role, 199, 214 to 219 configuration control process table, 211 workflow diagram, 210 configuration identification process table, 208 workflow diagram, 207 Configuration Management, 191 to 234 application, 192 forms configuration item, 224 form details, 225 to 229 input, 199 ITIL function, 192 KPIs COBIT, 201 ITIL, 200 Service Manager, 200 output, 199 process diagram, 198 processes, 191 to 234 configuration control, 209 to 211 configuration identification, 206 to 209 configuration management planning, 203 to 206 configuration status accounting and reporting, 212 to 215 configuration verification and audit, 215 to 219 master data management, 219 to 222 overview, 196
process tables configuration control, 211 configuration identification, 208 configuration management planning, 205 configuration status accounting and reporting, 214 configuration verification and audit, 218 master data management, 221 RACI matrix, 201 relationship with other applications, 21 service transition, 192 user roles, 199 cms/tools administrator, 199, 205 to 206 configuration administrator, 199, 206 to 222 configuration auditor, 199, 214 to 219 configuration manager, 199, 205 to 206 system administrator, 221 to 222 workflow diagrams configuration control, 210 configuration identification, 207 configuration management planning, 204 configuration status accounting and reporting, 213 configuration verification and audit, 217 master data management, 220 configuration management planning process table, 205 workflow diagram, 204 configuration manager Configuration Management user role, 199, 205 to 206 configuration status accounting and reporting process table, 214 workflow diagram, 213 configuration verification and audit process table, 218 workflow diagram, 217 control objectives and IT process framework see COBIT coordinate change implementation process table, 175 workflow diagram, 174
E
e-cab, Change Management user role, 179 to 181 emergency change handling process table, 181 workflow diagram, 180
252
F
form details Change Management, 185 to 189 Configuration Management, 225 to 229 Incident Management, 88 to 94 Problem Management, 135 to 139 Service Desk, 44 to 48 forms Change Management, new change request, 184 Configuration Management, configuration item, 224 Incident Management new incident, 86 updated incident, 87 Problem Management new known error, 140 new problem, 134 User Interaction Management escalated interaction, 43 new interaction, 42
I
incident analyst, Incident Management user role, 57, 64 to 82 incident assignment process table, 66 workflow diagram, 65 incident closure process table, 74 workflow diagram, 73 incident coordinator, Incident Management user role, 57, 64 to 82 incident escalation process table, 76 workflow diagram, 75 incident investigation and diagnosis process table, 69 workflow diagram, 68 incident logging process table, 63 workflow diagram, 62 Incident Management, 53 to 94 application, 54 forms form details, 88 to 94 new incident, 86 updated incident, 87 implementation notes, 55 input, 57 ITIL function, 54
KPIs COBIT, 59 ITIL, 58 Service Manager, 58 one-step close, 55 output, 57 process diagram, 56 processes, 53 to 94 complaint handling, 83 incident assignment, 64 to 66 incident closure, 72 to 74 incident escalation, 74 to 77 incident investigation and diagnosis, 67 to 69 incident logging, 61 to 64 incident resolution and recovery, 70 to 72 OLA and UC monitoring, 81 to 82 overview, 55 SLA monitoring, 78 to 80 process tables incident assignment, 66 incident closure, 74 incident escalation, 76 incident investigation and diagnosis, 69 incident logging, 63 incident resolution and recovery, 72 OLA and UC monitoring, 82 SLA monitoring, 80 RACI matrix, 59 relationship with other applications, 20 service operation, 54 two-step close, 55 user roles, 57 incident analyst, 57, 64 to 82 incident coordinator, 57, 64 to 82 incident manager, 57, 76 to 81 operator, 57, 61 to 64 service desk agent, 61 to 80 service desk manager, 57, 63 to 83 workflow diagrams incident assignment, 65 incident closure, 73 incident escalation, 75 incident investigation and diagnosis, 68 incident logging, 62 incident resolution and recovery, 71 OLA and UC monitoring, 81 SLA monitoring, 79 incident manager, Incident Management user role, 57, 76 to 81 incident resolution and recovery process table, 72 workflow diagram, 71
253
industry standards COBIT 4.1, 15 ISO 20000, 15 ITIL V3, 14 Information Technology Infrastructure Library see ITIL Information Technology Service Management see ITSM input Change Management, 157 Configuration Management, 199 Incident Management, 57 Problem Management, 101 User Interaction Management, 28 interaction closure process table, 39 workflow diagrams, 38 interaction detail tab User Interaction Management forms, 46 to 48 interaction handling process table, 36 workflow diagram, 35 International Organization for Standardization see ISO ISO, 13 ITIL, 11 Change Management function, 146 Change Management KPIs, 158 Configuration Management function, 192 KPIs, 200 Incident Management function, 54 KPIs, 58 Problem Management function, 96 KPIs, 102 service desk, function, 24 User Interaction Management, KPIs, 29 ITSM, 11
known error logging and categorization process table, 117 workflow diagram, 116 known error resolution process table, 126 workflow diagram, 125 known error solution acceptance process table, 123 workflow diagram, 122 KPIs COBIT Change Management, 158 Configuration Management, 201 Incident Management, 59 Problem Management, 102 User Interaction Management, 29 ITIL Change Management, 158 Configuration Management, 200 Incident Management, 58 Problem Management, 102 User Interaction Management, 29 Service Manager Change Management, 157 Configuration Management, 200 Incident Management, 58 Problem Management, 102 User Interaction Management, 29
M
master data management process table, 221 workflow diagram, 220 modules see applications
N
notifications, Problem Management, 97
O
OLA and UC monitoring process table, 82 workflow diagram, 81 one-step close, incident ticket, 55 operator, Incident Management user role, 61 to 64 output Change Management, 157 Configuration Management, 199 Incident Management, 57 Problem Management, 101 User Interaction Management, 28
K
Key Performance Indicators see KPIs known error investigation process table, 120 workflow diagram, 119
254
P
phases, Change Management, 147 proactive Problem Management, 96 problem analyst, Problem Management user role, 107 to 131 problem and known error monitoring process table, 131 workflow diagram, 130 problem closure and review process table, 129 workflow diagram, 128 problem coordinator, Problem Management user role, 105 to 131 problem detection, logging, and categorization process table, 107 workflow diagram, 106 problem investigation and diagnosis process table, 113 workflow diagram, 112 Problem Management, 95 to 141 alerts, 97 application, 96 forms form details, 135 to 139 new known error, 140 new problem, 134 input, 101 ITIL function, 96 KPIs COBIT, 102 ITIL, 102 Service Manager, 102 notifications, 97 output, 101 proactive, 96 process diagram, 98 processes, 95 to 141 known error investigation, 118 to 120 known error logging and categorization, 115 to 117 known error resolution, 124 to 126 known error solution acceptance, 121 to 123 overview, 97 problem and known error monitoring, 129 to 132 problem closure and review, 127 to 129 problem detection, logging, and categorization, 105 to 109 problem investigation and diagnosis, 111 to 114 problem prioritization and planning, 109 to 111
process tables known error investigation, 120 known error logging and categorization, 117 known error resolution, 126 known error solution acceptance, 123 problem and known error monitoring, 131 problem closure and review, 129 problem detection, logging, and categorization, 107 problem investigation and diagnosis, 113 problem prioritization and planning, 111 RACI matrix, 103 reactive, 96 relationship with other applications, 20 service operation, 96 user roles, 100 change coordinator, 124 to 126 problem analyst, 100, 107 to 131 problem coordinator, 100, 105 to 131 problem manager, 100, 111 to 132 workflow diagrams known error investigation, 119 known error logging and categorization, 116 known error resolution, 125 known error solution acceptance, 122 problem and known error monitoring, 130 problem closure and review, 128 problem detection, logging, and categorization, 106 problem investigation and diagnosis, 112 problem prioritization and planning, 110 problem manager Change Management user role, 161 to 166 Problem Management user role, 111 to 132 problem prioritization and planning process table, 111 workflow diagram, 110 process diagrams Change Management, 148 Configuration Management, 198 Incident Management, 56 Problem Management, 98 User Interaction Management, 26 processes Change Management, 145 to 189 Configuration Management, 191 to 234 Incident Management, 53 to 94 Problem Management, 95 to 141 User Interaction Management, 23 to 52
255
process tables Change Management change approval, 172 change assessment and planning, 169 change evaluation and closure, 178 change logging, 163 change review, 166 coordinate change implementation, 175 emergency change handling, 181 Configuration Management configuration control, 211 configuration identification, 208 configuration management planning, 205 configuration status accounting and reporting, 214 master data management, 221 verification and audit, 218 Incident Management complaint handling, 83 incident assignment, 66 incident closure, 74 incident escalation, 76 incident investigation and diagnosis, 69 incident logging, 63 incident resolution and recovery, 72 OLA and UC monitoring, 82 SLA monitoring, 80 Problem Management known error investigation, 120 known error logging and categorization, 117 known error resolution, 126 known error solution acceptance, 123 problem and known error monitoring, 131 problem closure and review, 129 problem detection, logging, and categorization, 107 problem investigation and diagnosis, 113 problem prioritization and planning, 111 Service Desk see process tables, User Interaction Management User Interaction Management interaction closure, 39 interaction handling, 36 self-service by user, 33
reactive Problem Management, 96 release manager, Change Management user role, 161 to 166 release packaging and build manager, Change Management user role, 179 to 182 Responsible, Accountable, Consulted, and Informed see RACI matrix RTE, 12 Run-Time Environment see RTE
S
self-service by user process table, 33 workflow diagram, 32 Service Desk, 23 to 52 form details, 44 to 48 processes see User Interaction Management, processes process tables see User Interaction Management, process tables relationship with other applications, 20 workflow diagrams see User Interaction Management, workflow diagrams service desk ITIL function, 24 responsibilities of, 24 service operation, 24 service desk agent Change Management user role, 161 to 163 Incident Management user role, 61 to 80 User Interaction Management user role, 28, 36 to 39 service desk manager, Incident Management user role, 57, 63 to 83 Service Manager applications, 13 architecture, 12 clients, 12 overview, 12 processes, 18 RTE, 12 server, 13 web client, 13 web tier, 13 Windows client, 13 service operation Incident Management, 54 Problem Management, 96 service desk, 24
R
RACI matrix Change Management, 159 Configuration Management, 201 Incident Management, 59 Problem Management, 103 User Interaction Management, 30
256
service transition Change Management, 146 Configuration Management, 192 SLA monitoring process table, 80 workflow diagram, 79 system administrator, Configuration Management user role, 221 to 222
T
two-step close, incident ticket, 55
U
UC and OLA monitoring process table, 82 workflow diagram, 81 user, User Interaction Management user role, 28, 33 to 34 User Interaction Management, 23 to 52 area, 50 category, 50 forms escalated interaction, 43 interaction detail tab, 46 to 48 new interaction, 42 input, 28 KPIs COBIT, 29 ITIL, 29 Service Manager, 29 output, 28 process diagram, 26 processes, 23 to 52 interaction closure, 37 to 39 interaction handling, 34 to 37 self-service by user, 31 to 34 process tables interaction closure, 39 interaction handling, 36 self-service by user, 33 RACI matrix, 30 sub-area, 50 user roles, 28 service desk agent, 28, 36 to 39 user, 28, 33 to 34 workflow diagrams interaction closure, 38 interaction handling, 35 self-service by user, 32
user roles Change Management, 156 change analyst, 156, 169 to 182 change approver, 156, 172 to 173 change coordinator, 156, 161 to 181 change manager, 156, 172 to 182 e-cab, 156, 179 to 181 problem manager, 161 to 166 release manager, 161 to 166 release packaging and build manager, 156, 179 to 182 service desk agent, 161 to 163 Configuration Management, 199 cms/tools administrator, 199, 205 to 206 configuration administrator, 199, 206 to 222 configuration auditor, 199, 214 to 219 configuration manager, 199, 205 to 206 system administrator, 221 to 222 Incident Management, 57 incident analyst, 57, 64 to 82 incident coordinator, 57, 64 to 82 incident manager, 57, 76 to 81 operator, 57, 61 to 64 service desk agent, 61 to 80 service desk manager, 57, 63 to 83 Problem Management, 100 change coordinator, 124 to 126 problem analyst, 100, 107 to 131 problem coordinator, 100, 105 to 131 problem manager, 100, 111 to 132 User Interaction Management, 28 service desk agent, 28, 36 to 39 user, 28, 33 to 34
W
wizards escalate interaction-incident, 52 escalate interaction-RFC, 52 escalate interaction-RFI, 52 workflow diagrams Change Management change approval, 171 change assessment and planning, 168 change evaluation and closure, 177 change logging, 162 change review, 165 coordinate change implementation, 174 emergency change handling, 180
257
Configuration Management configuration control, 210 configuration identification, 207 configuration management planning, 204 configuration status accounting and reporting, 213 configuration verification and audit, 217 master data management, 220 Incident Management complaint handling, 83 incident assignment, 65 incident closure, 73 incident escalation, 75 incident investigation and diagnosis, 68 incident logging, 62 incident resolution and recovery, 71 OLA and UC monitoring, 81 SLA monitoring, 79 Problem Management known error investigation, 119 known error logging and categorization, 116 known error resolution, 125 known error solution acceptance, 122 problem and known error monitoring, 130 problem closure and review, 128 problem detection, logging, and categorization, 106 problem investigation and diagnosis, 112 problem prioritization and planning, 110 Service Desk see workflow diagrams, User Interaction Management User Interaction Management interaction closure, 38 interaction handling, 35 self-service by user, 32
258